ACCESS

Notified:  June 02, 2014 Updated: June 02, 2014

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

Alcatel-Lucent

Notified:  June 02, 2014 Updated: June 02, 2014

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

Apple Inc.

Notified:  June 02, 2014 Updated: June 02, 2014

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

Aruba Networks, Inc.

Notified:  June 02, 2014 Updated: June 02, 2014

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

AT&T

Notified:  June 02, 2014 Updated: June 02, 2014

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

Attachmate

Notified:  June 02, 2014 Updated: August 19, 2014

Status

  Affected

Vendor Statement

Some Attachmate products with specific versions are affected by the CVE-2014-0224 OpenSSL "CCS' MITM vulnerability when TLS protocol connections are used. All affected products now have either new versions or hot fixes available to fix this issue. Security Updates technical notes are available for specific products: Security Updates and Reflection http://support.attachmate.com/techdocs/1708.html Security Updates and Reflection for Secure IT http://support.attachmate.com/techdocs/2288.html Security Updates and EXTRA! http://support.attachmate.com/techdocs/2501.html Security Updates and Reflection 2014 or Reflection 2011 http://support.attachmate.com/techdocs/2502.html Security Updates and Verastream http://support.attachmate.com/techdocs/2700.html

Vendor Information

We are not aware of further vendor information regarding this vulnerability.

Vendor References

http://support.attachmate.com/techdocs/1708.html http://support.attachmate.com/techdocs/2288.html http://support.attachmate.com/techdocs/2501.html http://support.attachmate.com/techdocs/2502.html http://support.attachmate.com/techdocs/2700.html

Addendum

There are no additional comments at this time.

Avaya, Inc.

Notified:  June 02, 2014 Updated: June 02, 2014

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

Barracuda Networks

Notified:  June 02, 2014 Updated: June 02, 2014

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

Belkin, Inc.

Notified:  June 02, 2014 Updated: June 02, 2014

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

Blue Coat Systems

Notified:  June 02, 2014 Updated: June 02, 2014

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

Brocade

Notified:  June 02, 2014 Updated: June 02, 2014

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

CA Technologies

Notified:  June 02, 2014 Updated: June 02, 2014

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

Charlotte's Web Networks

Notified:  June 02, 2014 Updated: June 02, 2014

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

Check Point Software Technologies

Notified:  June 02, 2014 Updated: June 02, 2014

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

Cisco Systems, Inc.

Notified:  June 02, 2014 Updated: June 02, 2014

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

Cray Inc.

Notified:  June 02, 2014 Updated: June 02, 2014

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

Debian GNU/Linux

Notified:  June 02, 2014 Updated: June 06, 2014

Status

  Affected

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Vendor Information

Please see the following URL for more information.

Vendor References

https://www.debian.org/security/2014/dsa-2950

Addendum

There are no additional comments at this time.

D-Link Systems, Inc.

Notified:  June 02, 2014 Updated: June 02, 2014

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

DragonFly BSD Project

Notified:  June 02, 2014 Updated: June 02, 2014

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

EMC Corporation

Notified:  June 02, 2014 Updated: June 02, 2014

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

Engarde Secure Linux

Notified:  June 02, 2014 Updated: June 02, 2014

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

Enterasys Networks

Notified:  June 02, 2014 Updated: June 02, 2014

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

Ericsson

Notified:  June 02, 2014 Updated: June 02, 2014

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

eSoft, Inc.

Notified:  June 02, 2014 Updated: June 02, 2014

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

Extreme Networks

Notified:  June 02, 2014 Updated: June 02, 2014

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

F5 Networks, Inc.

Notified:  June 02, 2014 Updated: June 02, 2014

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

Fedora Project

Notified:  June 02, 2014 Updated: June 06, 2014

Status

  Affected

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Vendor Information

Please see the following URL for more information.

Vendor References

https://admin.fedoraproject.org/updates/openssl-1.0.1e-38.fc19

Addendum

There are no additional comments at this time.

Force10 Networks, Inc.

Notified:  June 02, 2014 Updated: June 02, 2014

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

Fortinet, Inc.

Notified:  June 02, 2014 Updated: June 02, 2014

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

Foundry Networks, Inc.

Notified:  June 02, 2014 Updated: June 02, 2014

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

FreeBSD Project

Notified:  June 02, 2014 Updated: June 05, 2014

Status

  Affected

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Vendor Information

Please see the following URL for more information.

Vendor References

http://www.freebsd.org/security/advisories/FreeBSD-SA-14:14.openssl.asc

Addendum

There are no additional comments at this time.

Fujitsu

Notified:  June 02, 2014 Updated: June 02, 2014

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

Gentoo Linux

Notified:  June 02, 2014 Updated: June 02, 2014

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

Global Technology Associates, Inc.

Notified:  June 02, 2014 Updated: June 19, 2014

Status

  Affected

Vendor Statement

We have determined that GTA firewalls running the following versions of GB-OS are vulnerable and should be upgraded to the indicated version listed below. GB-OS version 6.1.0 to 6.1.7 are vulnerable and should upgrade to GB-OS 6.1.8 GB-OS version 6.0.0 to 6.0.8 are vulnerable and should upgrade to GB-OS 6.0.9 Customers using GTA firewalls with an unsupported version of GB-OS should upgrade to a currently supported version.

Vendor Information

We are not aware of further vendor information regarding this vulnerability.

Addendum

There are no additional comments at this time.

Google

Notified:  June 02, 2014 Updated: June 02, 2014

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

Hewlett-Packard Company

Notified:  June 02, 2014 Updated: August 21, 2014

Status

  Affected

Vendor Statement

Note: the current version of the following document is available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04401858 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c04401858 Version: 1 HPSBMU03101 rev.1 - HP Asset Manager, CloudSystem Chargeback, running OpenSSL, Remote Disclosure of Information or Unauthorized Access NOTICE: The information in this Security Bulletin should be acted upon as soon as possible. Release Date: 2014-08-19 Last Updated: 2014-08-19 Potential Security Impact: Remote disclosure of information or unauthorized access Source: Hewlett-Packard Company, HP Software Security Response Team VULNERABILITY SUMMARY A potential security vulnerability has been identified with HP Asset Manager and CloudSystem Chargeback running OpenSSL. The vulnerability could be exploited remotely to allow disclosure information or unauthorized access. This OpenSSL vulnerability was detected in specific OpenSSL versions. OpenSSL is a 3rd party product that is embedded with some HP Software products. This bulletin notifies HP Software customers about products affected by this OpenSSL vulnerability. Note: OpenSSL vulnerabilities, are found in the OpenSSL product cryptographic software library product. This weakness potentially allows Man in the Middle (MITM) attack where the attacker can decrypt and modify traffic from the attacked client and server. The impacted products appear in the list below are vulnerable due to embedding of OpenSSL standard release software. References: CVE-2014-0224 (SSRT101672) SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. HP Asset Manager - v9.4x, v9.3x, v5.2x HP CloudSystem Chargeback v9.40 BACKGROUND CVSS 2.0 Base Metrics Reference Base Vector Base Score CVE-2014-0224 (AV:N/AC:M/Au:N/C:P/I:P/A:P) 6.8 Information on CVSS is documented in HP Customer Notice: HPSN-2008-002 RESOLUTION HP has provided the following patch to resolve the vulnerability in HP Asset Manager and HP CloudSystem Chargeback. HP Asset Manager / CloudSystem Chargeback v9.40 Install patch v9.40.P4 For Windows(en) http://support.openview.hp.com/selfsolve/document/LID/AMGR_00376 For Windows(de) http://support.openview.hp.com/selfsolve/document/LID/AMGR_00377 For Windows(es) http://support.openview.hp.com/selfsolve/document/LID/AMGR_00378 For Windows(fr) http://support.openview.hp.com/selfsolve/document/LID/AMGR_00379 For Windows(it) http://support.openview.hp.com/selfsolve/document/LID/AMGR_00380 For Windows(ja) http://support.openview.hp.com/selfsolve/document/LID/AMGR_00381 For Windows(ko) http://support.openview.hp.com/selfsolve/document/LID/AMGR_00382 For Windows(nl) http://support.openview.hp.com/selfsolve/document/LID/AMGR_00383 For Windows(pt) http://support.openview.hp.com/selfsolve/document/LID/AMGR_00384 For Windows(ru) http://support.openview.hp.com/selfsolve/document/LID/AMGR_00385 For Windows(zh) http://support.openview.hp.com/selfsolve/document/LID/AMGR_00386 For Linux(en) http://support.openview.hp.com/selfsolve/document/LID/AMGR_00387 For Linux(de) http://support.openview.hp.com/selfsolve/document/LID/AMGR_00388 For Linux(es) http://support.openview.hp.com/selfsolve/document/LID/AMGR_00389 For Linux(fr) http://support.openview.hp.com/selfsolve/document/LID/AMGR_00390 For Linux(it) http://support.openview.hp.com/selfsolve/document/LID/AMGR_00391 For Linux(ja) http://support.openview.hp.com/selfsolve/document/LID/AMGR_00392 For Linux(ko) http://support.openview.hp.com/selfsolve/document/LID/AMGR_00393 For Linux(nl) http://support.openview.hp.com/selfsolve/document/LID/AMGR_00394 For Linux(pt) http://support.openview.hp.com/selfsolve/document/LID/AMGR_00395 For Linux(ru) http://support.openview.hp.com/selfsolve/document/LID/AMGR_00396 For Linux(zh) http://support.openview.hp.com/selfsolve/document/LID/AMGR_00397 HP Asset Manager v9.41 Install patch v9.41.P1 For Windows(en) http://support.openview.hp.com/selfsolve/document/LID/AMGR_00423 For windows(de) http://support.openview.hp.com/selfsolve/document/LID/AMGR_00424 For Windows(es) http://support.openview.hp.com/selfsolve/document/LID/AMGR_00425 For Windows(fr) http://support.openview.hp.com/selfsolve/document/LID/AMGR_00426 For Windows(it) http://support.openview.hp.com/selfsolve/document/LID/AMGR_00427 For Windows(ja) http://support.openview.hp.com/selfsolve/document/LID/AMGR_00428 For Windows(ko) http://support.openview.hp.com/selfsolve/document/LID/AMGR_00429 For Windows(nl) http://support.openview.hp.com/selfsolve/document/LID/AMGR_00430 For Windows(pt) http://support.openview.hp.com/selfsolve/document/LID/AMGR_00431 For Windows(ru) http://support.openview.hp.com/selfsolve/document/LID/AMGR_00432 For Windows(zh) http://support.openview.hp.com/selfsolve/document/LID/AMGR_00433 For Linux(en) http://support.openview.hp.com/selfsolve/document/LID/AMGR_00434 For Linux(de) http://support.openview.hp.com/selfsolve/document/LID/AMGR_00435 For Linux(es) http://support.openview.hp.com/selfsolve/document/LID/AMGR_00436 For Linux(fr) http://support.openview.hp.com/selfsolve/document/LID/AMGR_00437 For Linux(it) http://support.openview.hp.com/selfsolve/document/LID/AMGR_00438 For Linux(ja) http://support.openview.hp.com/selfsolve/document/LID/AMGR_00439 For Linux(ko) http://support.openview.hp.com/selfsolve/document/LID/AMGR_00440 For Linux(nl) http://support.openview.hp.com/selfsolve/document/LID/AMGR_00441 For Linux(pt) http://support.openview.hp.com/selfsolve/document/LID/AMGR_00442 For Linux(ru) http://support.openview.hp.com/selfsolve/document/LID/AMGR_00443 For Linux(zh) http://support.openview.hp.com/selfsolve/document/LID/AMGR_00444 HP Asset Manager v9.3x Install patch v9.32.P2 For Windows(en) http://support.openview.hp.com/selfsolve/document/LID/AMGR_00398 For Windows(de) http://support.openview.hp.com/selfsolve/document/LID/AMGR_00399 For Windows(es) http://support.openview.hp.com/selfsolve/document/LID/AMGR_00400 For Windows(fr) http://support.openview.hp.com/selfsolve/document/LID/AMGR_00401 For Windows(it) http://support.openview.hp.com/selfsolve/document/LID/AMGR_00402 For Windows(ja) http://support.openview.hp.com/selfsolve/document/LID/AMGR_00403 For Windows(ko) http://support.openview.hp.com/selfsolve/document/LID/AMGR_00404 For Windows(nl) http://support.openview.hp.com/selfsolve/document/LID/AMGR_00405 For Windows(pt) http://support.openview.hp.com/selfsolve/document/LID/AMGR_00406 For Windows(ru) http://support.openview.hp.com/selfsolve/document/LID/AMGR_00407 For Windows(zh) http://support.openview.hp.com/selfsolve/document/LID/AMGR_00408 For Linux(en) http://support.openview.hp.com/selfsolve/document/LID/AMGR_00409 For Linux (de) http://support.openview.hp.com/selfsolve/document/LID/AMGR_00410 For Linux (es) http://support.openview.hp.com/selfsolve/document/LID/AMGR_00411 For Linux (fr) http://support.openview.hp.com/selfsolve/document/LID/AMGR_00412 For Linux (it) http://support.openview.hp.com/selfsolve/document/LID/AMGR_00413 For Linux (ja) http://support.openview.hp.com/selfsolve/document/LID/AMGR_00414 For Linux (ko) http://support.openview.hp.com/selfsolve/document/LID/AMGR_00415 For Linux (nl) http://support.openview.hp.com/selfsolve/document/LID/AMGR_00416 For Linux (pt) http://support.openview.hp.com/selfsolve/document/LID/AMGR_00417 For Linux (ru) http://support.openview.hp.com/selfsolve/document/LID/AMGR_00418 For Linux (zh) http://support.openview.hp.com/selfsolve/document/LID/AMGR_00419 For AIX ANSI (en de es fr it nl pt) http://support.openview.hp.com/selfsolve/document/LID/AMGR_00420 For HPUX ANSI (en de es fr it nl pt) http://support.openview.hp.com/selfsolve/document/LID/AMGR_00421 For Solaris ANSI (en de es fr it nl pt) http://support.openview.hp.com/selfsolve/document/LID/AMGR_00422 HP Asset Manager v5.2x upgrade to v9.41.P1 HISTORY Version:1 (rev.1) - 19 August 2014 Initial release Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy. Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HP Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hp.com. Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com Subscribe: To initiate a subscription to receive future HP Security Bulletin alerts via Email: http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins Security Bulletin Archive: A list of recently released Security Bulletins is available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/ Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB. 3C = 3COM 3P = 3rd Party Software GN = HP General Software HF = HP Hardware and Firmware MP = MPE/iX MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PI = Printing and Imaging PV = ProCurve ST = Storage Software TU = Tru64 UNIX UX = HP-UX Copyright 2014 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners.

Vendor Information

We are not aware of further vendor information regarding this vulnerability.

Vendor References

https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04401858

Addendum

There are no additional comments at this time.

Hitachi

Notified:  June 02, 2014 Updated: June 02, 2014

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

IBM Corporation

Notified:  June 02, 2014 Updated: June 16, 2014

Status

  Affected

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Vendor Information

Please see the links below for more information.

Vendor References

http://www-01.ibm.com/support/docview.wss?uid=swg21676041 http://www-01.ibm.com/support/docview.wss?uid=swg21676062 http://aix.software.ibm.com/aix/efixes/security/openssl_advisory9.asc http://www-01.ibm.com/support/docview.wss?uid=swg21675821

Addendum

There are no additional comments at this time.

Intel Corporation

Notified:  June 02, 2014 Updated: June 02, 2014

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

Internet Security Systems, Inc.

Notified:  June 02, 2014 Updated: June 02, 2014

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

Intoto

Notified:  June 02, 2014 Updated: June 02, 2014

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

Juniper Networks, Inc.

Notified:  June 02, 2014 Updated: June 02, 2014

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

m0n0wall

Notified:  June 02, 2014 Updated: June 02, 2014

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

Mandriva S. A.

Notified:  June 02, 2014 Updated: June 02, 2014

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

MarkLogic Corporation

Notified:  June 02, 2014 Updated: June 02, 2014

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

McAfee

Notified:  June 02, 2014 Updated: June 02, 2014

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

Microsoft Corporation

Notified:  June 02, 2014 Updated: June 02, 2014

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

NEC Corporation

Updated:  October 26, 2015

Status

  Affected

Vendor Statement

We provide information on this issue at the following URL: (only in Japanese) (only in Japanese)

Vendor Information

We are not aware of further vendor information regarding this vulnerability.

Vendor References

http://jpn.nec.com/security-info/secinfo/nv15-011.html http://jpn.nec.com/security-info/av14-002.html

Addendum

There are no additional comments at this time.

NEC Corporation

Notified:  June 02, 2014 Updated: June 09, 2014

Status

  Affected

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Vendor Information

Please see the following link for more information.

Vendor References

http://jpn.nec.com/security-info/av14-002.html

Addendum

There are no additional comments at this time.

NetBSD

Notified:  June 02, 2014 Updated: June 02, 2014

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

netfilter

Notified:  June 02, 2014 Updated: June 02, 2014

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

Nokia

Notified:  June 02, 2014 Updated: June 02, 2014

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

Novell, Inc.

Notified:  June 02, 2014 Updated: June 02, 2014

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

NVIDIA

Notified:  June 02, 2014 Updated: September 10, 2014

Status

  Affected

Vendor Statement

Please see http://nvidia.custhelp.com/app/answers/detail/a_id/3566 for NVIDIA's statement on this vulnerability.

Vendor Information

We are not aware of further vendor information regarding this vulnerability.

Vendor References

http://nvidia.custhelp.com/app/answers/detail/a_id/3566

Addendum

There are no additional comments at this time.

OpenBSD

Notified:  June 02, 2014 Updated: June 02, 2014

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

Opengear

Notified:  June 02, 2014 Updated: June 02, 2014

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

OpenSSL

Notified:  May 09, 2014 Updated: June 05, 2014

Status

  Affected

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Vendor Information

Please see the following URL for more information.

Vendor References

https://www.openssl.org/news/secadv_20140605.txt

Addendum

There are no additional comments at this time.

OpenVPN Technologies

Notified:  June 02, 2014 Updated: June 02, 2014

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

Openwall GNU/*/Linux

Notified:  June 02, 2014 Updated: June 02, 2014

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

Oracle Corporation

Notified:  June 02, 2014 Updated: June 16, 2014

Status

  Affected

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Vendor Information

Please see the links below for more information.

Vendor References

http://linux.oracle.com/errata/ELSA-2014-0625.html

Addendum

There are no additional comments at this time.

Palo Alto Networks

Notified:  June 02, 2014 Updated: June 02, 2014

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

pfSENSE

Notified:  June 02, 2014 Updated: June 02, 2014

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

Process Software

Notified:  June 02, 2014 Updated: June 02, 2014

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

Q1 Labs

Notified:  June 02, 2014 Updated: June 02, 2014

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

QNX Software Systems Inc.

Notified:  June 02, 2014 Updated: June 02, 2014

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

Red Hat, Inc.

Notified:  June 02, 2014 Updated: June 05, 2014

Status

  Affected

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Vendor Information

Please see the following URL for more information.

Vendor References

https://rhn.redhat.com/errata/RHSA-2014-0625.html

Addendum

There are no additional comments at this time.

SafeNet

Notified:  June 02, 2014 Updated: June 02, 2014

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

Slackware Linux Inc.

Notified:  June 02, 2014 Updated: June 02, 2014

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

SmoothWall

Notified:  June 02, 2014 Updated: June 02, 2014

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

Snort

Notified:  June 02, 2014 Updated: June 02, 2014

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

Sony Corporation

Notified:  June 02, 2014 Updated: June 02, 2014

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

Sophos, Inc.

Notified:  June 02, 2014 Updated: June 02, 2014

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

Sourcefire

Notified:  June 02, 2014 Updated: June 02, 2014

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

Stonesoft

Notified:  June 02, 2014 Updated: June 02, 2014

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

SUSE Linux

Notified:  June 02, 2014 Updated: June 09, 2014

Status

  Affected

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Vendor Information

Please see the following links for more information.

Vendor References

http://support.novell.com/security/cve/CVE-2014-0224.html http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00003.html

Addendum

There are no additional comments at this time.

Symantec

Notified:  June 02, 2014 Updated: June 02, 2014

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

TippingPoint Technologies Inc.

Notified:  June 02, 2014 Updated: June 02, 2014

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

Turbolinux

Notified:  June 02, 2014 Updated: June 02, 2014

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

Ubuntu

Notified:  June 02, 2014 Updated: June 05, 2014

Status

  Affected

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Vendor Information

Please see the following URL for more information.

Vendor References

http://www.ubuntu.com/usn/usn-2232-1/

Addendum

There are no additional comments at this time.

Unisys

Notified:  June 02, 2014 Updated: June 02, 2014

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

VMware

Notified:  June 02, 2014 Updated: June 16, 2014

Status

  Affected

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Vendor Information

Please see the links below for more information.

Vendor References

http://www.vmware.com/security/advisories/VMSA-2014-0006.html

Addendum

There are no additional comments at this time.

Watchguard Technologies, Inc.

Notified:  June 02, 2014 Updated: June 02, 2014

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

Wind River Systems, Inc.

Notified:  June 02, 2014 Updated: June 02, 2014

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

ZyXEL

Notified:  June 02, 2014 Updated: June 02, 2014

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.