High severity7.5CISA KEVNVD Advisory· Published Apr 7, 2014· Updated Apr 21, 2026
CVE-2014-0160
CVE-2014-0160
Description
The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before 1.0.1g do not properly handle Heartbeat Extension packets, which allows remote attackers to obtain sensitive information from process memory via crafted packets that trigger a buffer over-read, as demonstrated by reading private keys, related to d1_both.c and t1_lib.c, aka the Heartbleed bug.
Affected products
47cpe:2.3:a:broadcom:symantec_messaging_gateway:10.6.0:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:a:broadcom:symantec_messaging_gateway:10.6.0:*:*:*:*:*:*:*
- cpe:2.3:a:broadcom:symantec_messaging_gateway:10.6.1:*:*:*:*:*:*:*
- cpe:2.3:a:filezilla-project:filezilla_server:*:*:*:*:*:*:*:*Range: <0.9.44
cpe:2.3:a:mitel:micollab:6.0:*:*:*:*:*:*:*+ 5 more
- cpe:2.3:a:mitel:micollab:6.0:*:*:*:*:*:*:*
- cpe:2.3:a:mitel:micollab:7.0:*:*:*:*:*:*:*
- cpe:2.3:a:mitel:micollab:7.1:*:*:*:*:*:*:*
- cpe:2.3:a:mitel:micollab:7.2:*:*:*:*:*:*:*
- cpe:2.3:a:mitel:micollab:7.3:*:*:*:*:*:*:*
- cpe:2.3:a:mitel:micollab:7.3.0.104:*:*:*:*:*:*:*
cpe:2.3:a:mitel:mivoice:1.1.2.5:*:*:*:*:lync:*:*+ 4 more
- cpe:2.3:a:mitel:mivoice:1.1.2.5:*:*:*:*:lync:*:*
- cpe:2.3:a:mitel:mivoice:1.1.3.3:*:*:*:*:skype_for_business:*:*
- cpe:2.3:a:mitel:mivoice:1.2.0.11:*:*:*:*:skype_for_business:*:*
- cpe:2.3:a:mitel:mivoice:1.3.2.2:*:*:*:*:skype_for_business:*:*
- cpe:2.3:a:mitel:mivoice:1.4.0.102:*:*:*:*:skype_for_business:*:*
- cpe:2.3:a:redhat:gluster_storage:2.1:*:*:*:*:*:*:*
- cpe:2.3:a:redhat:virtualization:6.0:*:*:*:*:*:*:*
- cpe:2.3:a:siemens:wincc_open_architecture:3.12:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*+ 2 more
- cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:13.10:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*+ 2 more
- cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*
cpe:2.3:o:intellian:v100_firmware:1.20:*:*:*:*:*:*:*+ 2 more
- cpe:2.3:o:intellian:v100_firmware:1.20:*:*:*:*:*:*:*
- cpe:2.3:o:intellian:v100_firmware:1.21:*:*:*:*:*:*:*
- cpe:2.3:o:intellian:v100_firmware:1.24:*:*:*:*:*:*:*
cpe:2.3:o:intellian:v60_firmware:1.15:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:o:intellian:v60_firmware:1.15:*:*:*:*:*:*:*
- cpe:2.3:o:intellian:v60_firmware:1.25:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_eus:6.5:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_tus:6.5:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:ricon:s9922l_firmware:16.10.3\(3794\):*:*:*:*:*:*:*
- cpe:2.3:o:siemens:application_processing_engine_firmware:2.0:*:*:*:*:*:*:*
- cpe:2.3:o:siemens:cp_1543-1_firmware:1.1:*:*:*:*:*:*:*
- cpe:2.3:o:siemens:simatic_s7-1500_firmware:1.5:*:*:*:*:*:*:*
- cpe:2.3:o:siemens:simatic_s7-1500t_firmware:1.5:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
128- www.oracle.com/technetwork/topics/security/cpujul2014-1972956.htmlnvdPatchThird Party Advisory
- www.oracle.com/technetwork/topics/security/opensslheartbleedcve-2014-0160-2188454.htmlnvdPatchThird Party Advisory
- lists.apache.org/thread.html/ba661b0edd913b39ff129a32d855620dd861883ade05fd88a8ce517d%40%3Cdev.tomcat.apache.org%3EnvdMailing ListPatchThird Party Advisory
- lists.apache.org/thread.html/f8e0814e11c7f21f42224b6de111cb3f5e5ab5c15b78924c516d4ec2%40%3Cdev.tomcat.apache.org%3EnvdMailing ListPatchThird Party Advisory
- lists.apache.org/thread.html/re3b72cbb13e1dfe85c4a06959a3b6ca6d939b407ecca80db12b54220%40%3Cdev.tomcat.apache.org%3EnvdMailing ListPatchThird Party Advisory
- lists.apache.org/thread.html/rf8e8c091182b45daa50d3557cad9b10bb4198e3f08cf8f1c66a1b08d%40%3Cdev.tomcat.apache.org%3EnvdMailing ListPatchThird Party Advisory
- www.exploit-db.com/exploits/32745nvdExploitThird Party AdvisoryVDB Entry
- www.exploit-db.com/exploits/32764nvdExploitThird Party AdvisoryVDB Entry
- gist.github.com/chapmajs/10473815nvdExploit
- sku11army.blogspot.com/2020/01/heartbleed-hearts-continue-to-bleed.htmlnvdExploitPermissions RequiredThird Party Advisory
- yunus-shn.medium.com/ricon-industrial-cellular-router-heartbleed-attack-2634221c02bdnvdBroken LinkExploitThird Party Advisory
- advisories.mageia.org/MGASA-2014-0165.htmlnvdThird Party Advisory
- blog.fox-it.com/2014/04/08/openssl-heartbleed-bug-live-blog/nvdIssue TrackingThird Party Advisory
- heartbleed.comnvdThird Party Advisory
- lists.fedoraproject.org/pipermail/package-announce/2014-April/131221.htmlnvdBroken LinkThird Party Advisory
- lists.fedoraproject.org/pipermail/package-announce/2014-April/131291.htmlnvdBroken LinkThird Party Advisory
- lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.htmlnvdMailing ListThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2014-04/msg00004.htmlnvdMailing ListThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2014-04/msg00005.htmlnvdMailing ListThird Party Advisory
- lists.opensuse.org/opensuse-updates/2014-04/msg00061.htmlnvdMailing ListThird Party Advisory
- marc.infonvdMailing ListThird Party Advisory
- marc.infonvdMailing ListThird Party Advisory
- marc.infonvdMailing ListThird Party Advisory
- marc.infonvdMailing ListThird Party Advisory
- marc.infonvdMailing ListThird Party Advisory
- marc.infonvdMailing ListThird Party Advisory
- marc.infonvdMailing ListThird Party Advisory
- marc.infonvdMailing ListThird Party Advisory
- marc.infonvdMailing ListThird Party Advisory
- marc.infonvdMailing ListThird Party Advisory
- marc.infonvdMailing ListThird Party Advisory
- marc.infonvdMailing ListThird Party Advisory
- marc.infonvdMailing ListThird Party Advisory
- marc.infonvdMailing ListThird Party Advisory
- marc.infonvdMailing ListThird Party Advisory
- marc.infonvdMailing ListThird Party Advisory
- marc.infonvdMailing ListThird Party Advisory
- marc.infonvdMailing ListThird Party Advisory
- marc.infonvdMailing ListThird Party Advisory
- marc.infonvdMailing ListThird Party Advisory
- marc.infonvdMailing ListThird Party Advisory
- marc.infonvdMailing ListThird Party Advisory
- marc.infonvdMailing ListThird Party Advisory
- marc.infonvdMailing ListThird Party Advisory
- marc.infonvdMailing ListThird Party Advisory
- marc.infonvdMailing ListThird Party Advisory
- marc.infonvdMailing ListThird Party Advisory
- marc.infonvdMailing ListThird Party Advisory
- marc.infonvdMailing ListThird Party Advisory
- marc.infonvdMailing ListThird Party Advisory
- marc.infonvdMailing ListThird Party Advisory
- marc.infonvdMailing ListThird Party Advisory
- marc.infonvdMailing ListThird Party Advisory
- marc.infonvdMailing ListThird Party Advisory
- marc.infonvdMailing ListThird Party Advisory
- marc.infonvdMailing ListThird Party Advisory
- marc.infonvdMailing ListThird Party Advisory
- marc.infonvdMailing ListThird Party Advisory
- public.support.unisys.com/common/public/vulnerability/NVD_Detail_Rpt.aspxnvdThird Party Advisory
- public.support.unisys.com/common/public/vulnerability/NVD_Detail_Rpt.aspxnvdPermissions RequiredThird Party Advisory
- rhn.redhat.com/errata/RHSA-2014-0376.htmlnvdThird Party Advisory
- rhn.redhat.com/errata/RHSA-2014-0377.htmlnvdThird Party Advisory
- rhn.redhat.com/errata/RHSA-2014-0378.htmlnvdThird Party Advisory
- rhn.redhat.com/errata/RHSA-2014-0396.htmlnvdThird Party Advisory
- seclists.org/fulldisclosure/2014/Apr/109nvdMailing ListThird Party Advisory
- seclists.org/fulldisclosure/2014/Apr/173nvdMailing ListThird Party Advisory
- seclists.org/fulldisclosure/2014/Apr/190nvdMailing ListThird Party Advisory
- seclists.org/fulldisclosure/2014/Apr/90nvdMailing ListThird Party Advisory
- seclists.org/fulldisclosure/2014/Apr/91nvdMailing ListThird Party Advisory
- seclists.org/fulldisclosure/2014/Dec/23nvdMailing ListThird Party Advisory
- secunia.com/advisories/57347nvdBroken LinkThird Party Advisory
- secunia.com/advisories/57483nvdBroken LinkThird Party Advisory
- secunia.com/advisories/57721nvdBroken LinkThird Party Advisory
- secunia.com/advisories/57836nvdBroken LinkThird Party Advisory
- secunia.com/advisories/57966nvdBroken LinkThird Party Advisory
- secunia.com/advisories/57968nvdBroken LinkThird Party Advisory
- secunia.com/advisories/59139nvdBroken LinkThird Party Advisory
- secunia.com/advisories/59243nvdBroken LinkThird Party Advisory
- secunia.com/advisories/59347nvdBroken LinkThird Party Advisory
- support.citrix.com/article/CTX140605nvdThird Party Advisory
- tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140409-heartbleednvdThird Party Advisory
- www-01.ibm.com/support/docview.wssnvdThird Party Advisory
- www-01.ibm.com/support/docview.wssnvdThird Party Advisory
- www-01.ibm.com/support/docview.wssnvdThird Party Advisory
- www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdfnvdBroken LinkThird Party Advisory
- www.debian.org/security/2014/dsa-2896nvdMailing ListThird Party Advisory
- www.f-secure.com/en/web/labs_global/fsc-2014-1nvdBroken LinkThird Party Advisory
- www.getchef.com/blog/2014/04/09/chef-server-heartbleed-cve-2014-0160-releases/nvdThird Party Advisory
- www.kb.cert.org/vuls/id/720951nvdThird Party AdvisoryUS Government Resource
- www.kerio.com/support/kerio-control/release-historynvdBroken LinkThird Party Advisory
- www.mandriva.com/security/advisoriesnvdBroken LinkThird Party Advisory
- www.openssl.org/news/secadv_20140407.txtnvdBroken LinkVendor Advisory
- www.securityfocus.com/archive/1/534161/100/0/threadednvdBroken LinkNot ApplicableThird Party AdvisoryVDB Entry
- www.securityfocus.com/bid/66690nvdBroken LinkThird Party AdvisoryVDB Entry
- www.securitytracker.com/id/1030026nvdBroken LinkThird Party AdvisoryVDB Entry
- www.securitytracker.com/id/1030074nvdBroken LinkThird Party AdvisoryVDB Entry
- www.securitytracker.com/id/1030077nvdBroken LinkThird Party AdvisoryVDB Entry
- www.securitytracker.com/id/1030078nvdBroken LinkThird Party AdvisoryVDB Entry
- www.securitytracker.com/id/1030079nvdBroken LinkThird Party AdvisoryVDB Entry
- www.securitytracker.com/id/1030080nvdBroken LinkThird Party AdvisoryVDB Entry
- www.securitytracker.com/id/1030081nvdBroken LinkThird Party AdvisoryVDB Entry
- www.securitytracker.com/id/1030082nvdBroken LinkThird Party AdvisoryVDB Entry
- www.splunk.com/view/SP-CAAAMB3nvdThird Party Advisory
- www.symantec.com/security_response/securityupdates/detail.jspnvdThird Party Advisory
- www.ubuntu.com/usn/USN-2165-1nvdThird Party Advisory
- www.us-cert.gov/ncas/alerts/TA14-098AnvdThird Party AdvisoryUS Government Resource
- bugzilla.redhat.com/show_bug.cginvdIssue TrackingThird Party Advisory
- cert-portal.siemens.com/productcert/pdf/ssa-635659.pdfnvdThird Party Advisory
- lists.balabit.hu/pipermail/syslog-ng-announce/2014-April/000184.htmlnvdMailing ListThird Party Advisory
- support.f5.com/kb/en-us/solutions/public/15000/100/sol15159.htmlnvdThird Party Advisory
- support.f5.com/kb/en-us/solutions/public/15000/100/sol15159.htmlnvdThird Party Advisory
- www.cert.fi/en/reports/2014/vulnerability788210.htmlnvdNot ApplicableThird Party Advisory
- www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-17-0008nvdThird Party Advisory
- cogentdatahub.com/ReleaseNotes.htmlnvdRelease Notes
- download.schneider-electric.com/filesnvdBroken Link
- www-01.ibm.com/support/docview.wssnvdBroken Link
- www.blackberry.com/btsc/KB35882nvdBroken Link
- www.getchef.com/blog/2014/04/09/chef-server-11-0-12-release/nvdRelease Notes
- www.getchef.com/blog/2014/04/09/enterprise-chef-1-4-9-release/nvdRelease Notes
- www.getchef.com/blog/2014/04/09/enterprise-chef-11-1-3-release/nvdRelease Notes
- www.innominate.com/data/downloads/manuals/mdm_1.5.2.1_Release_Notes.pdfnvdNot Applicable
- www.vmware.com/security/advisories/VMSA-2014-0012.htmlnvdBroken Link
- www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0nvdBroken Link
- blog.torproject.org/blog/openssl-bug-cve-2014-0160nvdIssue Tracking
- code.google.com/p/mod-spdy/issues/detailnvdIssue Tracking
- filezilla-project.org/versions.phpnvdRelease Notes
- h20566.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/nvdBroken Link
- www.cisa.gov/known-exploited-vulnerabilities-catalognvdUS Government Resource
News mentions
0No linked articles in our index yet.