search menu icon-carat-right cmu-wordmark

CERT Coordination Center


OpenSSL is vulnerable to a man-in-the-middle attack

Vulnerability Note VU#978508

Original Release Date: 2014-06-05 | Last Revised: 2015-10-27

Overview

OpenSSL is vulnerable to a man-in-the-middle attack.

Description

The OpenSSL security advisory states:

SSL/TLS MITM vulnerability (CVE-2014-0224)
===========================================

An attacker using a carefully crafted handshake can force the use of weak keying material in OpenSSL SSL/TLS clients and servers. This can be exploited by a Man-in-the-middle (MITM) attack where the attacker can decrypt and modify traffic from the attacked client and server.

The attack can only be performed between a vulnerable client *and* server. OpenSSL clients are vulnerable in all versions of OpenSSL. Servers are only known to be vulnerable in OpenSSL 1.0.1 and 1.0.2-beta1. Users of OpenSSL servers earlier than 1.0.1 are advised to upgrade as a precaution.

OpenSSL 0.9.8 SSL/TLS users (client and/or server) should upgrade to 0.9.8za.
OpenSSL 1.0.0 SSL/TLS users (client and/or server) should upgrade to 1.0.0m.
OpenSSL 1.0.1 SSL/TLS users (client and/or server) should upgrade to 1.0.1h.

Thanks to KIKUCHI Masashi (Lepidum Co. Ltd.) for discovering and researching this issue. This issue was reported to OpenSSL on 1st May 2014 via JPCERT/CC.

The fix was developed by Stephen Henson of the OpenSSL core team partly based on an original patch from KIKUCHI Masashi.

Additional details may be found in the OpenSSL security advisory. This vulnerability is one of many that has been fixed in the latest release.

Masashi Kikuchi has written a technical blog post about the vulnerability.

Impact

A remote attacker with a man-in-the-middle vantage point on the network may be able to decrypt or modify traffic between a client and server.

Solution

Apply an Update

OpenSSL 0.9.8 SSL/TLS users (client and/or server) should upgrade to 0.9.8za.
OpenSSL 1.0.0 SSL/TLS users (client and/or server) should upgrade to 1.0.0m.
OpenSSL 1.0.1 SSL/TLS users (client and/or server) should upgrade to 1.0.1h.

Vendor Information

978508
Expand all

Attachmate

Notified:  June 02, 2014 Updated:  August 19, 2014

Status

  Affected

Vendor Statement

Some Attachmate products with specific versions are affected by the
CVE-2014-0224 OpenSSL "CCS' MITM vulnerability when TLS protocol
connections are used.  All affected products now have either new versions
or hot fixes available to fix this issue.

Security Updates technical notes are available for specific products:
Security Updates and Reflection
http://support.attachmate.com/techdocs/1708.html
Security Updates and Reflection for Secure IT
http://support.attachmate.com/techdocs/2288.html
Security Updates and EXTRA!
http://support.attachmate.com/techdocs/2501.html
Security Updates and Reflection 2014 or Reflection 2011
http://support.attachmate.com/techdocs/2502.html
Security Updates and Verastream
http://support.attachmate.com/techdocs/2700.html

Vendor Information

We are not aware of further vendor information regarding this vulnerability.

Vendor References

http://support.attachmate.com/techdocs/1708.html http://support.attachmate.com/techdocs/2288.html http://support.attachmate.com/techdocs/2501.html http://support.attachmate.com/techdocs/2502.html http://support.attachmate.com/techdocs/2700.html

Addendum

There are no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

Debian GNU/Linux

Notified:  June 02, 2014 Updated:  June 06, 2014

Status

  Affected

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Vendor Information

Please see the following URL for more information.

Vendor References

https://www.debian.org/security/2014/dsa-2950

Addendum

There are no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

Fedora Project

Notified:  June 02, 2014 Updated:  June 06, 2014

Status

  Affected

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Vendor Information

Please see the following URL for more information.

Vendor References

https://admin.fedoraproject.org/updates/openssl-1.0.1e-38.fc19

Addendum

There are no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

FreeBSD Project

Notified:  June 02, 2014 Updated:  June 05, 2014

Status

  Affected

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Vendor Information

Please see the following URL for more information.

Vendor References

http://www.freebsd.org/security/advisories/FreeBSD-SA-14:14.openssl.asc

Addendum

There are no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

Global Technology Associates, Inc.

Notified:  June 02, 2014 Updated:  June 19, 2014

Status

  Affected

Vendor Statement

We have determined that GTA firewalls running the following versions of GB-OS are vulnerable and should be upgraded to the indicated version listed below.

GB-OS version 6.1.0 to 6.1.7 are vulnerable and should upgrade to GB-OS 6.1.8
GB-OS version 6.0.0 to 6.0.8 are vulnerable and should upgrade to GB-OS 6.0.9

Customers using GTA firewalls with an unsupported version of GB-OS should upgrade to a currently supported version.

Vendor Information

We are not aware of further vendor information regarding this vulnerability.

Addendum

There are no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

Hewlett-Packard Company

Notified:  June 02, 2014 Updated:  August 21, 2014

Status

  Affected

Vendor Statement

Note: the current version of the following document is available here:
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04401858

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c04401858
Version: 1

HPSBMU03101 rev.1 - HP Asset Manager, CloudSystem Chargeback, running
OpenSSL, Remote Disclosure of Information or Unauthorized Access

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2014-08-19
Last Updated: 2014-08-19

Potential Security Impact: Remote disclosure of information or unauthorized
access

Source: Hewlett-Packard Company, HP Software Security Response Team

VULNERABILITY SUMMARY
A potential security vulnerability has been identified with HP Asset Manager
and CloudSystem Chargeback running OpenSSL. The vulnerability could be
exploited remotely to allow disclosure information or unauthorized access.

This OpenSSL vulnerability was detected in specific OpenSSL versions. OpenSSL
is a 3rd party product that is embedded with some HP Software products. This
bulletin notifies HP Software customers about products affected by this
OpenSSL vulnerability.

Note: OpenSSL vulnerabilities, are found in the OpenSSL product cryptographic
software library product. This weakness potentially allows Man in the Middle
(MITM) attack where the attacker can decrypt and modify traffic from the
attacked client and server. The impacted products appear in the list below
are vulnerable due to embedding of OpenSSL standard release software.

References:

CVE-2014-0224 (SSRT101672)

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

HP Asset Manager - v9.4x, v9.3x, v5.2x
HP CloudSystem Chargeback v9.40

BACKGROUND

CVSS 2.0 Base Metrics
===========================================================
Reference              Base Vector             Base Score
CVE-2014-0224    (AV:N/AC:M/Au:N/C:P/I:P/A:P)       6.8
===========================================================
Information on CVSS is documented
in HP Customer Notice: HPSN-2008-002

RESOLUTION

HP has provided the following patch to resolve the vulnerability in HP Asset
Manager and HP CloudSystem Chargeback.

HP Asset Manager / CloudSystem Chargeback v9.40
Install patch v9.40.P4

For Windows(en)
http://support.openview.hp.com/selfsolve/document/LID/AMGR_00376

For Windows(de)
http://support.openview.hp.com/selfsolve/document/LID/AMGR_00377

For Windows(es)
http://support.openview.hp.com/selfsolve/document/LID/AMGR_00378

For Windows(fr)
http://support.openview.hp.com/selfsolve/document/LID/AMGR_00379

For Windows(it)
http://support.openview.hp.com/selfsolve/document/LID/AMGR_00380

For Windows(ja)
http://support.openview.hp.com/selfsolve/document/LID/AMGR_00381

For Windows(ko)
http://support.openview.hp.com/selfsolve/document/LID/AMGR_00382

For Windows(nl)
http://support.openview.hp.com/selfsolve/document/LID/AMGR_00383

For Windows(pt)
http://support.openview.hp.com/selfsolve/document/LID/AMGR_00384

For Windows(ru)
http://support.openview.hp.com/selfsolve/document/LID/AMGR_00385

For Windows(zh)
http://support.openview.hp.com/selfsolve/document/LID/AMGR_00386

For Linux(en)
http://support.openview.hp.com/selfsolve/document/LID/AMGR_00387

For Linux(de)
http://support.openview.hp.com/selfsolve/document/LID/AMGR_00388

For Linux(es)
http://support.openview.hp.com/selfsolve/document/LID/AMGR_00389

For Linux(fr)
http://support.openview.hp.com/selfsolve/document/LID/AMGR_00390

For Linux(it)
http://support.openview.hp.com/selfsolve/document/LID/AMGR_00391

For Linux(ja)
http://support.openview.hp.com/selfsolve/document/LID/AMGR_00392

For Linux(ko)
http://support.openview.hp.com/selfsolve/document/LID/AMGR_00393

For Linux(nl)
http://support.openview.hp.com/selfsolve/document/LID/AMGR_00394

For Linux(pt)
http://support.openview.hp.com/selfsolve/document/LID/AMGR_00395

For Linux(ru)
http://support.openview.hp.com/selfsolve/document/LID/AMGR_00396

For Linux(zh)
http://support.openview.hp.com/selfsolve/document/LID/AMGR_00397

HP Asset Manager v9.41
Install patch v9.41.P1

For Windows(en)
http://support.openview.hp.com/selfsolve/document/LID/AMGR_00423

For windows(de)
http://support.openview.hp.com/selfsolve/document/LID/AMGR_00424

For Windows(es)
http://support.openview.hp.com/selfsolve/document/LID/AMGR_00425

For Windows(fr)
http://support.openview.hp.com/selfsolve/document/LID/AMGR_00426

For Windows(it)
http://support.openview.hp.com/selfsolve/document/LID/AMGR_00427

For Windows(ja)
http://support.openview.hp.com/selfsolve/document/LID/AMGR_00428

For Windows(ko)
http://support.openview.hp.com/selfsolve/document/LID/AMGR_00429

For Windows(nl)
http://support.openview.hp.com/selfsolve/document/LID/AMGR_00430

For Windows(pt)
http://support.openview.hp.com/selfsolve/document/LID/AMGR_00431

For Windows(ru)
http://support.openview.hp.com/selfsolve/document/LID/AMGR_00432

For Windows(zh)
http://support.openview.hp.com/selfsolve/document/LID/AMGR_00433

For Linux(en)
http://support.openview.hp.com/selfsolve/document/LID/AMGR_00434

For Linux(de)
http://support.openview.hp.com/selfsolve/document/LID/AMGR_00435

For Linux(es)
http://support.openview.hp.com/selfsolve/document/LID/AMGR_00436

For Linux(fr)
http://support.openview.hp.com/selfsolve/document/LID/AMGR_00437

For Linux(it)
http://support.openview.hp.com/selfsolve/document/LID/AMGR_00438

For Linux(ja)
http://support.openview.hp.com/selfsolve/document/LID/AMGR_00439

For Linux(ko)
http://support.openview.hp.com/selfsolve/document/LID/AMGR_00440

For Linux(nl)
http://support.openview.hp.com/selfsolve/document/LID/AMGR_00441

For Linux(pt)
http://support.openview.hp.com/selfsolve/document/LID/AMGR_00442

For Linux(ru)
http://support.openview.hp.com/selfsolve/document/LID/AMGR_00443

For Linux(zh)
http://support.openview.hp.com/selfsolve/document/LID/AMGR_00444

HP Asset Manager v9.3x
Install patch v9.32.P2

For Windows(en)
http://support.openview.hp.com/selfsolve/document/LID/AMGR_00398

For Windows(de)
http://support.openview.hp.com/selfsolve/document/LID/AMGR_00399

For Windows(es)
http://support.openview.hp.com/selfsolve/document/LID/AMGR_00400

For Windows(fr)
http://support.openview.hp.com/selfsolve/document/LID/AMGR_00401

For Windows(it)
http://support.openview.hp.com/selfsolve/document/LID/AMGR_00402

For Windows(ja)
http://support.openview.hp.com/selfsolve/document/LID/AMGR_00403

For Windows(ko)
http://support.openview.hp.com/selfsolve/document/LID/AMGR_00404

For Windows(nl)
http://support.openview.hp.com/selfsolve/document/LID/AMGR_00405

For Windows(pt)
http://support.openview.hp.com/selfsolve/document/LID/AMGR_00406

For Windows(ru)
http://support.openview.hp.com/selfsolve/document/LID/AMGR_00407

For Windows(zh)
http://support.openview.hp.com/selfsolve/document/LID/AMGR_00408

For Linux(en)
http://support.openview.hp.com/selfsolve/document/LID/AMGR_00409

For Linux (de)
http://support.openview.hp.com/selfsolve/document/LID/AMGR_00410

For Linux (es)
http://support.openview.hp.com/selfsolve/document/LID/AMGR_00411

For Linux (fr)
http://support.openview.hp.com/selfsolve/document/LID/AMGR_00412

For Linux (it)
http://support.openview.hp.com/selfsolve/document/LID/AMGR_00413

For Linux (ja)
http://support.openview.hp.com/selfsolve/document/LID/AMGR_00414

For Linux (ko)
http://support.openview.hp.com/selfsolve/document/LID/AMGR_00415

For Linux (nl)
http://support.openview.hp.com/selfsolve/document/LID/AMGR_00416

For Linux (pt)
http://support.openview.hp.com/selfsolve/document/LID/AMGR_00417

For Linux (ru)
http://support.openview.hp.com/selfsolve/document/LID/AMGR_00418

For Linux (zh)
http://support.openview.hp.com/selfsolve/document/LID/AMGR_00419

For AIX ANSI (en de es fr it nl pt)
http://support.openview.hp.com/selfsolve/document/LID/AMGR_00420

For HPUX ANSI (en de es fr it nl pt)
http://support.openview.hp.com/selfsolve/document/LID/AMGR_00421

For Solaris ANSI (en de es fr it nl pt)
http://support.openview.hp.com/selfsolve/document/LID/AMGR_00422

HP Asset Manager v5.2x
upgrade to v9.41.P1

HISTORY
Version:1 (rev.1) - 19 August 2014 Initial release

Third Party Security Patches: Third party security patches that are to be
installed on systems running HP software products should be applied in
accordance with the customer's patch management policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HP Services support channel.  For other issues about
the content of this Security Bulletin, send e-mail to security-alert@hp.com.

Report: To report a potential security vulnerability with any HP supported
product, send Email to: security-alert@hp.com

Subscribe: To initiate a subscription to receive future HP Security Bulletin
alerts via Email:
http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins

Security Bulletin Archive: A list of recently released Security Bulletins is
available here:
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HP General Software
HF = HP Hardware and Firmware
MP = MPE/iX
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PI = Printing and Imaging
PV = ProCurve
ST = Storage Software
TU = Tru64 UNIX
UX = HP-UX

Copyright 2014 Hewlett-Packard Development Company, L.P.
Hewlett-Packard Company shall not be liable for technical or editorial errors
or omissions contained herein. The information provided is provided "as is"
without warranty of any kind. To the extent permitted by law, neither HP or
its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice.
Hewlett-Packard Company and the names of Hewlett-Packard products referenced
herein are trademarks of Hewlett-Packard Company in the United States and
other countries. Other product and company names mentioned herein may be
trademarks of their respective owners.

Vendor Information

We are not aware of further vendor information regarding this vulnerability.

Vendor References

https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04401858

Addendum

There are no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

IBM Corporation

Notified:  June 02, 2014 Updated:  June 16, 2014

Status

  Affected

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Vendor Information

Please see the links below for more information.

Vendor References

http://www-01.ibm.com/support/docview.wss?uid=swg21676041 http://www-01.ibm.com/support/docview.wss?uid=swg21676062 http://aix.software.ibm.com/aix/efixes/security/openssl_advisory9.asc http://www-01.ibm.com/support/docview.wss?uid=swg21675821

Addendum

There are no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

NEC Corporation

Notified:  June 02, 2014 Updated:  June 09, 2014

Status

  Affected

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Vendor Information

Please see the following link for more information.

Vendor References

http://jpn.nec.com/security-info/av14-002.html

Addendum

There are no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

NEC Corporation

Updated:  October 26, 2015

Status

  Affected

Vendor Statement

We provide information on this issue at the following URL:

<http://jpn.nec.com/security-info/secinfo/nv15-011.html>(only in Japanese)
<http://jpn.nec.com/security-info/av14-002.html>(only in Japanese)

Vendor Information

We are not aware of further vendor information regarding this vulnerability.

Vendor References

http://jpn.nec.com/security-info/secinfo/nv15-011.html http://jpn.nec.com/security-info/av14-002.html

Addendum

There are no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

NVIDIA

Notified:  June 02, 2014 Updated:  September 10, 2014

Status

  Affected

Vendor Statement

Please see http://nvidia.custhelp.com/app/answers/detail/a_id/3566 for NVIDIA's statement on this vulnerability.

Vendor Information

We are not aware of further vendor information regarding this vulnerability.

Vendor References

http://nvidia.custhelp.com/app/answers/detail/a_id/3566

Addendum

There are no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

OpenSSL

Notified:  May 09, 2014 Updated:  June 05, 2014

Status

  Affected

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Vendor Information

Please see the following URL for more information.

Vendor References

https://www.openssl.org/news/secadv_20140605.txt

Addendum

There are no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

Oracle Corporation

Notified:  June 02, 2014 Updated:  June 16, 2014

Status

  Affected

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Vendor Information

Please see the links below for more information.

Vendor References

http://linux.oracle.com/errata/ELSA-2014-0625.html

Addendum

There are no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

Red Hat, Inc.

Notified:  June 02, 2014 Updated:  June 05, 2014

Status

  Affected

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Vendor Information

Please see the following URL for more information.

Vendor References

https://rhn.redhat.com/errata/RHSA-2014-0625.html

Addendum

There are no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

SUSE Linux

Notified:  June 02, 2014 Updated:  June 09, 2014

Status

  Affected

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Vendor Information

Please see the following links for more information.

Vendor References

http://support.novell.com/security/cve/CVE-2014-0224.html http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00003.html

Addendum

There are no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

Ubuntu

Notified:  June 02, 2014 Updated:  June 05, 2014

Status

  Affected

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Vendor Information

Please see the following URL for more information.

Vendor References

http://www.ubuntu.com/usn/usn-2232-1/

Addendum

There are no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

VMware

Notified:  June 02, 2014 Updated:  June 16, 2014

Status

  Affected

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Vendor Information

Please see the links below for more information.

Vendor References

http://www.vmware.com/security/advisories/VMSA-2014-0006.html

Addendum

There are no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

ACCESS

Notified:  June 02, 2014 Updated:  June 02, 2014

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

AT&T

Notified:  June 02, 2014 Updated:  June 02, 2014

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

Alcatel-Lucent

Notified:  June 02, 2014 Updated:  June 02, 2014

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

Apple Inc.

Notified:  June 02, 2014 Updated:  June 02, 2014

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

Aruba Networks, Inc.

Notified:  June 02, 2014 Updated:  June 02, 2014

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

Avaya, Inc.

Notified:  June 02, 2014 Updated:  June 02, 2014

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

Barracuda Networks

Notified:  June 02, 2014 Updated:  June 02, 2014

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

Belkin, Inc.

Notified:  June 02, 2014 Updated:  June 02, 2014

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

Blue Coat Systems

Notified:  June 02, 2014 Updated:  June 02, 2014

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

Brocade

Notified:  June 02, 2014 Updated:  June 02, 2014

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

CA Technologies

Notified:  June 02, 2014 Updated:  June 02, 2014

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

Charlotte's Web Networks

Notified:  June 02, 2014 Updated:  June 02, 2014

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

Check Point Software Technologies

Notified:  June 02, 2014 Updated:  June 02, 2014

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

Cisco Systems, Inc.

Notified:  June 02, 2014 Updated:  June 02, 2014

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

Cray Inc.

Notified:  June 02, 2014 Updated:  June 02, 2014

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

D-Link Systems, Inc.

Notified:  June 02, 2014 Updated:  June 02, 2014

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

DragonFly BSD Project

Notified:  June 02, 2014 Updated:  June 02, 2014

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

EMC Corporation

Notified:  June 02, 2014 Updated:  June 02, 2014

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

Engarde Secure Linux

Notified:  June 02, 2014 Updated:  June 02, 2014

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

Enterasys Networks

Notified:  June 02, 2014 Updated:  June 02, 2014

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

Ericsson

Notified:  June 02, 2014 Updated:  June 02, 2014

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

Extreme Networks

Notified:  June 02, 2014 Updated:  June 02, 2014

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

F5 Networks, Inc.

Notified:  June 02, 2014 Updated:  June 02, 2014

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

Force10 Networks, Inc.

Notified:  June 02, 2014 Updated:  June 02, 2014

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

Fortinet, Inc.

Notified:  June 02, 2014 Updated:  June 02, 2014

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

Foundry Networks, Inc.

Notified:  June 02, 2014 Updated:  June 02, 2014

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

Fujitsu

Notified:  June 02, 2014 Updated:  June 02, 2014

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

Gentoo Linux

Notified:  June 02, 2014 Updated:  June 02, 2014

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

Google

Notified:  June 02, 2014 Updated:  June 02, 2014

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

Hitachi

Notified:  June 02, 2014 Updated:  June 02, 2014

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

Intel Corporation

Notified:  June 02, 2014 Updated:  June 02, 2014

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

Internet Security Systems, Inc.

Notified:  June 02, 2014 Updated:  June 02, 2014

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

Intoto

Notified:  June 02, 2014 Updated:  June 02, 2014

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

Juniper Networks, Inc.

Notified:  June 02, 2014 Updated:  June 02, 2014

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

Mandriva S. A.

Notified:  June 02, 2014 Updated:  June 02, 2014

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

MarkLogic Corporation

Notified:  June 02, 2014 Updated:  June 02, 2014

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

McAfee

Notified:  June 02, 2014 Updated:  June 02, 2014

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

Microsoft Corporation

Notified:  June 02, 2014 Updated:  June 02, 2014

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

NetBSD

Notified:  June 02, 2014 Updated:  June 02, 2014

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

Nokia

Notified:  June 02, 2014 Updated:  June 02, 2014

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

Novell, Inc.

Notified:  June 02, 2014 Updated:  June 02, 2014

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

OpenBSD

Notified:  June 02, 2014 Updated:  June 02, 2014

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

OpenVPN Technologies

Notified:  June 02, 2014 Updated:  June 02, 2014

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

Opengear

Notified:  June 02, 2014 Updated:  June 02, 2014

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

Openwall GNU/*/Linux

Notified:  June 02, 2014 Updated:  June 02, 2014

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

Palo Alto Networks

Notified:  June 02, 2014 Updated:  June 02, 2014

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

Process Software

Notified:  June 02, 2014 Updated:  June 02, 2014

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

Q1 Labs

Notified:  June 02, 2014 Updated:  June 02, 2014

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

QNX Software Systems Inc.

Notified:  June 02, 2014 Updated:  June 02, 2014

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

SafeNet

Notified:  June 02, 2014 Updated:  June 02, 2014

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

Slackware Linux Inc.

Notified:  June 02, 2014 Updated:  June 02, 2014

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

SmoothWall

Notified:  June 02, 2014 Updated:  June 02, 2014

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

Snort

Notified:  June 02, 2014 Updated:  June 02, 2014

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

Sony Corporation

Notified:  June 02, 2014 Updated:  June 02, 2014

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

Sophos, Inc.

Notified:  June 02, 2014 Updated:  June 02, 2014

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

Sourcefire

Notified:  June 02, 2014 Updated:  June 02, 2014

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

Stonesoft

Notified:  June 02, 2014 Updated:  June 02, 2014

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

Symantec

Notified:  June 02, 2014 Updated:  June 02, 2014

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

TippingPoint Technologies Inc.

Notified:  June 02, 2014 Updated:  June 02, 2014

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

Turbolinux

Notified:  June 02, 2014 Updated:  June 02, 2014

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

Unisys

Notified:  June 02, 2014 Updated:  June 02, 2014

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

Watchguard Technologies, Inc.

Notified:  June 02, 2014 Updated:  June 02, 2014

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

Wind River Systems, Inc.

Notified:  June 02, 2014 Updated:  June 02, 2014

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

ZyXEL

Notified:  June 02, 2014 Updated:  June 02, 2014

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

eSoft, Inc.

Notified:  June 02, 2014 Updated:  June 02, 2014

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

m0n0wall

Notified:  June 02, 2014 Updated:  June 02, 2014

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

netfilter

Notified:  June 02, 2014 Updated:  June 02, 2014

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

pfSENSE

Notified:  June 02, 2014 Updated:  June 02, 2014

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.


CVSS Metrics

Group Score Vector
Base 6.4 AV:A/AC:M/Au:N/C:C/I:P/A:N
Temporal 5.0 E:POC/RL:OF/RC:C
Environmental 8.1 CDP:H/TD:H/CR:H/IR:M/AR:L

References

Credit

Thanks to KIKUCHI Masashi for reporting this vulnerability.

This document was written by Jared Allar.

Other Information

CVE IDs: CVE-2014-0224
Date Public: 2014-06-05
Date First Published: 2014-06-05
Date Last Updated: 2015-10-27 02:18 UTC
Document Revision: 30

Sponsored by the Department of Homeland Security Office of Cybersecurity and Communications.