| NVD脆弱性検索トップ | -> | NVD Vulnerability Detail |
| Summary | OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly restrict processing of ChangeCipherSpec messages, which allows man-in-the-middle attackers to trigger use of a zero-length master key in certain OpenSSL-to-OpenSSL communications, and consequently hijack sessions or obtain sensitive information, via a crafted TLS handshake, aka the "CCS Injection" vulnerability. |
|---|---|
| Publication Date | June 6, 2014, 6:55 a.m. |
| Registration Date | Jan. 26, 2021, 3:04 p.m. |
| Last Update | Nov. 21, 2024, 11:01 a.m. |
| CVSS3.1 : HIGH | |
| スコア | 7.4 |
|---|---|
| Vector | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N |
| 攻撃元区分(AV) | ネットワーク |
| 攻撃条件の複雑さ(AC) | 高 |
| 攻撃に必要な特権レベル(PR) | 不要 |
| 利用者の関与(UI) | 不要 |
| 影響の想定範囲(S) | 変更なし |
| 機密性への影響(C) | 高 |
| 完全性への影響(I) | 高 |
| 可用性への影響(A) | なし |
| CVSS2.0 : MEDIUM | |
| Score | 5.8 |
|---|---|
| Vector | AV:N/AC:M/Au:N/C:P/I:P/A:N |
| 攻撃元区分(AV) | ネットワーク |
| 攻撃条件の複雑さ(AC) | 中 |
| 攻撃前の認証要否(Au) | 不要 |
| 機密性への影響(C) | 低 |
| 完全性への影響(I) | 低 |
| 可用性への影響(A) | なし |
| Get all privileges. | いいえ |
| Get user privileges | いいえ |
| Get other privileges | いいえ |
| User operation required | いいえ |
| Configuration1 | or higher | or less | more than | less than | |
| cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:* | 1.0.0 | 1.0.0m | |||
| cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:* | 1.0.1 | 1.0.1h | |||
| cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:* | 0.9.8za | ||||
| Configuration2 | or higher | or less | more than | less than | |
| cpe:2.3:a:redhat:jboss_enterprise_web_platform:5.2.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:redhat:storage:2.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:o:redhat:enterprise_linux:4:*:*:*:*:*:*:* | |||||
| cpe:2.3:o:redhat:enterprise_linux:5:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:redhat:jboss_enterprise_web_server:2.0.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:redhat:jboss_enterprise_application_platform:5.2.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.2.3:*:*:*:*:*:*:* | |||||
| cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:* | |||||
| cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:* | |||||
| Configuration3 | or higher | or less | more than | less than | |
| cpe:2.3:a:filezilla-project:filezilla_server:*:*:*:*:*:*:*:* | 0.9.45 | ||||
| Configuration4 | or higher | or less | more than | less than | |
| cpe:2.3:o:siemens:application_processing_engine_firmware:*:*:*:*:*:*:*:* | 2.0.2 | ||||
| execution environment | |||||
| 1 | cpe:2.3:h:siemens:application_processing_engine:-:*:*:*:*:*:*:* | ||||
| Configuration5 | or higher | or less | more than | less than | |
| cpe:2.3:o:siemens:cp1543-1_firmware:*:*:*:*:*:*:*:* | 1.1.25 | ||||
| execution environment | |||||
| 1 | cpe:2.3:h:siemens:cp1543-1:-:*:*:*:*:*:*:* | ||||
| Configuration6 | or higher | or less | more than | less than | |
| cpe:2.3:o:siemens:s7-1500_firmware:*:*:*:*:*:*:*:* | 1.6 | ||||
| execution environment | |||||
| 1 | cpe:2.3:h:siemens:s7-1500:-:*:*:*:*:*:*:* | ||||
| Configuration7 | or higher | or less | more than | less than | |
| cpe:2.3:o:siemens:rox_firmware:*:*:*:*:*:*:*:* | 1.16.1 | ||||
| execution environment | |||||
| 1 | cpe:2.3:h:siemens:rox:-:*:*:*:*:*:*:* | ||||
| Configuration8 | or higher | or less | more than | less than | |
| cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:* | 10.0.0 | 10.0.13 | |||
| Configuration9 | or higher | or less | more than | less than | |
| cpe:2.3:a:python:python:*:*:*:*:*:*:*:* | 3.4.0 | 3.4.2 | |||
| cpe:2.3:a:python:python:*:*:*:*:*:*:*:* | 2.7.0 | 2.7.8 | |||
| Configuration10 | or higher | or less | more than | less than | |
| cpe:2.3:a:nodejs:node.js:*:*:*:*:*:*:*:* | 0.10.29 | ||||
| No | URL | refsource | タグ |
|---|---|---|---|
| 1 | http://aix.software.ibm.com/aix/efixes/security/openssl_advisory9.asc |
|
|
| 2 | http://aix.software.ibm.com/aix/efixes/security/openssl_advisory9.asc |
|
|
| 3 | http://ccsinjection.lepidum.co.jp |
|
|
| 4 | http://ccsinjection.lepidum.co.jp |
|
|
| 5 | http://dev.mysql.com/doc/relnotes/workbench/en/wb-news-6-1-7.html |
|
|
| 6 | http://dev.mysql.com/doc/relnotes/workbench/en/wb-news-6-1-7.html |
|
|
| 7 | http://esupport.trendmicro.com/solution/en-US/1103813.aspx |
|
|
| 8 | http://esupport.trendmicro.com/solution/en-US/1103813.aspx |
|
|
| 9 | http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10629 |
|
|
| 10 | http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10629 |
|
|
| 11 | http://kb.juniper.net/InfoCenter/index?page=content&id=KB29195 |
|
|
| 12 | http://kb.juniper.net/InfoCenter/index?page=content&id=KB29195 |
|
|
| 13 | http://kb.juniper.net/InfoCenter/index?page=content&id=KB29217 |
|
|
| 14 | http://kb.juniper.net/InfoCenter/index?page=content&id=KB29217 |
|
|
| 15 | http://linux.oracle.com/errata/ELSA-2014-1053.html |
|
|
| 16 | http://linux.oracle.com/errata/ELSA-2014-1053.html |
|
|
| 17 | http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136470.html |
|
|
| 18 | http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136470.html |
|
|
| 19 | http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.html |
|
|
| 20 | http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.html |
|
|
| 21 | http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html |
|
|
| 22 | http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html |
|
|
| 23 | http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html |
|
|
| 24 | http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html |
|
|
| 25 | http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html |
|
|
| 26 | http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html |
|
|
| 27 | http://lists.opensuse.org/opensuse-updates/2015-02/msg00030.html |
|
|
| 28 | http://lists.opensuse.org/opensuse-updates/2015-02/msg00030.html |
|
|
| 29 | http://marc.info/?l=bugtraq&m=140266410314613&w=2 |
|
|
| 30 | http://marc.info/?l=bugtraq&m=140266410314613&w=2 |
|
|
| 31 | http://marc.info/?l=bugtraq&m=140266410314613&w=2 |
|
|
| 32 | http://marc.info/?l=bugtraq&m=140266410314613&w=2 |
|
|
| 33 | http://marc.info/?l=bugtraq&m=140317760000786&w=2 |
|
|
| 34 | http://marc.info/?l=bugtraq&m=140317760000786&w=2 |
|
|
| 35 | http://marc.info/?l=bugtraq&m=140369637402535&w=2 |
|
|
| 36 | http://marc.info/?l=bugtraq&m=140369637402535&w=2 |
|
|
| 37 | http://marc.info/?l=bugtraq&m=140386311427810&w=2 |
|
|
| 38 | http://marc.info/?l=bugtraq&m=140386311427810&w=2 |
|
|
| 39 | http://marc.info/?l=bugtraq&m=140389274407904&w=2 |
|
|
| 40 | http://marc.info/?l=bugtraq&m=140389274407904&w=2 |
|
|
| 41 | http://marc.info/?l=bugtraq&m=140389355508263&w=2 |
|
|
| 42 | http://marc.info/?l=bugtraq&m=140389355508263&w=2 |
|
|
| 43 | http://marc.info/?l=bugtraq&m=140431828824371&w=2 |
|
|
| 44 | http://marc.info/?l=bugtraq&m=140431828824371&w=2 |
|
|
| 45 | http://marc.info/?l=bugtraq&m=140448122410568&w=2 |
|
|
| 46 | http://marc.info/?l=bugtraq&m=140448122410568&w=2 |
|
|
| 47 | http://marc.info/?l=bugtraq&m=140482916501310&w=2 |
|
|
| 48 | http://marc.info/?l=bugtraq&m=140482916501310&w=2 |
|
|
| 49 | http://marc.info/?l=bugtraq&m=140491231331543&w=2 |
|
|
| 50 | http://marc.info/?l=bugtraq&m=140491231331543&w=2 |
|
|
| 51 | http://marc.info/?l=bugtraq&m=140499864129699&w=2 |
|
|
| 52 | http://marc.info/?l=bugtraq&m=140499864129699&w=2 |
|
|
| 53 | http://marc.info/?l=bugtraq&m=140544599631400&w=2 |
|
|
| 54 | http://marc.info/?l=bugtraq&m=140544599631400&w=2 |
|
|
| 55 | http://marc.info/?l=bugtraq&m=140604261522465&w=2 |
|
|
| 56 | http://marc.info/?l=bugtraq&m=140604261522465&w=2 |
|
|
| 57 | http://marc.info/?l=bugtraq&m=140621259019789&w=2 |
|
|
| 58 | http://marc.info/?l=bugtraq&m=140621259019789&w=2 |
|
|
| 59 | http://marc.info/?l=bugtraq&m=140672208601650&w=2 |
|
|
| 60 | http://marc.info/?l=bugtraq&m=140672208601650&w=2 |
|
|
| 61 | http://marc.info/?l=bugtraq&m=140752315422991&w=2 |
|
|
| 62 | http://marc.info/?l=bugtraq&m=140752315422991&w=2 |
|
|
| 63 | http://marc.info/?l=bugtraq&m=140784085708882&w=2 |
|
|
| 64 | http://marc.info/?l=bugtraq&m=140784085708882&w=2 |
|
|
| 65 | http://marc.info/?l=bugtraq&m=140794476212181&w=2 |
|
|
| 66 | http://marc.info/?l=bugtraq&m=140794476212181&w=2 |
|
|
| 67 | http://marc.info/?l=bugtraq&m=140852757108392&w=2 |
|
|
| 68 | http://marc.info/?l=bugtraq&m=140852757108392&w=2 |
|
|
| 69 | http://marc.info/?l=bugtraq&m=140852826008699&w=2 |
|
|
| 70 | http://marc.info/?l=bugtraq&m=140852826008699&w=2 |
|
|
| 71 | http://marc.info/?l=bugtraq&m=140870499402361&w=2 |
|
|
| 72 | http://marc.info/?l=bugtraq&m=140870499402361&w=2 |
|
|
| 73 | http://marc.info/?l=bugtraq&m=140904544427729&w=2 |
|
|
| 74 | http://marc.info/?l=bugtraq&m=140904544427729&w=2 |
|
|
| 75 | http://marc.info/?l=bugtraq&m=140983229106599&w=2 |
|
|
| 76 | http://marc.info/?l=bugtraq&m=140983229106599&w=2 |
|
|
| 77 | http://marc.info/?l=bugtraq&m=141025641601169&w=2 |
|
|
| 78 | http://marc.info/?l=bugtraq&m=141025641601169&w=2 |
|
|
| 79 | http://marc.info/?l=bugtraq&m=141147110427269&w=2 |
|
|
| 80 | http://marc.info/?l=bugtraq&m=141147110427269&w=2 |
|
|
| 81 | http://marc.info/?l=bugtraq&m=141164638606214&w=2 |
|
|
| 82 | http://marc.info/?l=bugtraq&m=141164638606214&w=2 |
|
|
| 83 | http://marc.info/?l=bugtraq&m=141383410222440&w=2 |
|
|
| 84 | http://marc.info/?l=bugtraq&m=141383410222440&w=2 |
|
|
| 85 | http://marc.info/?l=bugtraq&m=141383465822787&w=2 |
|
|
| 86 | http://marc.info/?l=bugtraq&m=141383465822787&w=2 |
|
|
| 87 | http://marc.info/?l=bugtraq&m=141658880509699&w=2 |
|
|
| 88 | http://marc.info/?l=bugtraq&m=141658880509699&w=2 |
|
|
| 89 | http://marc.info/?l=bugtraq&m=142350350616251&w=2 |
|
|
| 90 | http://marc.info/?l=bugtraq&m=142350350616251&w=2 |
|
|
| 91 | http://marc.info/?l=bugtraq&m=142350350616251&w=2 |
|
|
| 92 | http://marc.info/?l=bugtraq&m=142350350616251&w=2 |
|
|
| 93 | http://marc.info/?l=bugtraq&m=142546741516006&w=2 |
|
|
| 94 | http://marc.info/?l=bugtraq&m=142546741516006&w=2 |
|
|
| 95 | http://marc.info/?l=bugtraq&m=142805027510172&w=2 |
|
|
| 96 | http://marc.info/?l=bugtraq&m=142805027510172&w=2 |
|
|
| 97 | http://puppetlabs.com/security/cve/cve-2014-0224 |
|
|
| 98 | http://puppetlabs.com/security/cve/cve-2014-0224 |
|
|
| 99 | http://rhn.redhat.com/errata/RHSA-2014-0624.html |
|
|
| 100 | http://rhn.redhat.com/errata/RHSA-2014-0624.html |
|
|
| 101 | http://rhn.redhat.com/errata/RHSA-2014-0626.html |
|
|
| 102 | http://rhn.redhat.com/errata/RHSA-2014-0626.html |
|
|
| 103 | http://rhn.redhat.com/errata/RHSA-2014-0627.html |
|
|
| 104 | http://rhn.redhat.com/errata/RHSA-2014-0627.html |
|
|
| 105 | http://rhn.redhat.com/errata/RHSA-2014-0630.html |
|
|
| 106 | http://rhn.redhat.com/errata/RHSA-2014-0630.html |
|
|
| 107 | http://rhn.redhat.com/errata/RHSA-2014-0631.html |
|
|
| 108 | http://rhn.redhat.com/errata/RHSA-2014-0631.html |
|
|
| 109 | http://rhn.redhat.com/errata/RHSA-2014-0632.html |
|
|
| 110 | http://rhn.redhat.com/errata/RHSA-2014-0632.html |
|
|
| 111 | http://rhn.redhat.com/errata/RHSA-2014-0633.html |
|
|
| 112 | http://rhn.redhat.com/errata/RHSA-2014-0633.html |
|
|
| 113 | http://rhn.redhat.com/errata/RHSA-2014-0680.html |
|
|
| 114 | http://rhn.redhat.com/errata/RHSA-2014-0680.html |
|
|
| 115 | http://seclists.org/fulldisclosure/2014/Dec/23 |
|
|
| 116 | http://seclists.org/fulldisclosure/2014/Dec/23 |
|
|
| 117 | http://seclists.org/fulldisclosure/2014/Jun/38 |
|
|
| 118 | http://seclists.org/fulldisclosure/2014/Jun/38 |
|
|
| 119 | http://secunia.com/advisories/58128 |
|
|
| 120 | http://secunia.com/advisories/58128 |
|
|
| 121 | http://secunia.com/advisories/58337 |
|
|
| 122 | http://secunia.com/advisories/58337 |
|
|
| 123 | http://secunia.com/advisories/58385 |
|
|
| 124 | http://secunia.com/advisories/58385 |
|
|
| 125 | http://secunia.com/advisories/58433 |
|
|
| 126 | http://secunia.com/advisories/58433 |
|
|
| 127 | http://secunia.com/advisories/58492 |
|
|
| 128 | http://secunia.com/advisories/58492 |
|
|
| 129 | http://secunia.com/advisories/58579 |
|
|
| 130 | http://secunia.com/advisories/58579 |
|
|
| 131 | http://secunia.com/advisories/58615 |
|
|
| 132 | http://secunia.com/advisories/58615 |
|
|
| 133 | http://secunia.com/advisories/58639 |
|
|
| 134 | http://secunia.com/advisories/58639 |
|
|
| 135 | http://secunia.com/advisories/58660 |
|
|
| 136 | http://secunia.com/advisories/58660 |
|
|
| 137 | http://secunia.com/advisories/58667 |
|
|
| 138 | http://secunia.com/advisories/58667 |
|
|
| 139 | http://secunia.com/advisories/58713 |
|
|
| 140 | http://secunia.com/advisories/58713 |
|
|
| 141 | http://secunia.com/advisories/58714 |
|
|
| 142 | http://secunia.com/advisories/58714 |
|
|
| 143 | http://secunia.com/advisories/58716 |
|
|
| 144 | http://secunia.com/advisories/58716 |
|
|
| 145 | http://secunia.com/advisories/58719 |
|
|
| 146 | http://secunia.com/advisories/58719 |
|
|
| 147 | http://secunia.com/advisories/58742 |
|
|
| 148 | http://secunia.com/advisories/58742 |
|
|
| 149 | http://secunia.com/advisories/58743 |
|
|
| 150 | http://secunia.com/advisories/58743 |
|
|
| 151 | http://secunia.com/advisories/58745 |
|
|
| 152 | http://secunia.com/advisories/58745 |
|
|
| 153 | http://secunia.com/advisories/58759 |
|
|
| 154 | http://secunia.com/advisories/58759 |
|
|
| 155 | http://secunia.com/advisories/58930 |
|
|
| 156 | http://secunia.com/advisories/58930 |
|
|
| 157 | http://secunia.com/advisories/58939 |
|
|
| 158 | http://secunia.com/advisories/58939 |
|
|
| 159 | http://secunia.com/advisories/58945 |
|
|
| 160 | http://secunia.com/advisories/58945 |
|
|
| 161 | http://secunia.com/advisories/58977 |
|
|
| 162 | http://secunia.com/advisories/58977 |
|
|
| 163 | http://secunia.com/advisories/59004 |
|
|
| 164 | http://secunia.com/advisories/59004 |
|
|
| 165 | http://secunia.com/advisories/59012 |
|
|
| 166 | http://secunia.com/advisories/59012 |
|
|
| 167 | http://secunia.com/advisories/59040 |
|
|
| 168 | http://secunia.com/advisories/59040 |
|
|
| 169 | http://secunia.com/advisories/59043 |
|
|
| 170 | http://secunia.com/advisories/59043 |
|
|
| 171 | http://secunia.com/advisories/59055 |
|
|
| 172 | http://secunia.com/advisories/59055 |
|
|
| 173 | http://secunia.com/advisories/59063 |
|
|
| 174 | http://secunia.com/advisories/59063 |
|
|
| 175 | http://secunia.com/advisories/59093 |
|
|
| 176 | http://secunia.com/advisories/59093 |
|
|
| 177 | http://secunia.com/advisories/59101 |
|
|
| 178 | http://secunia.com/advisories/59101 |
|
|
| 179 | http://secunia.com/advisories/59120 |
|
|
| 180 | http://secunia.com/advisories/59120 |
|
|
| 181 | http://secunia.com/advisories/59126 |
|
|
| 182 | http://secunia.com/advisories/59126 |
|
|
| 183 | http://secunia.com/advisories/59132 |
|
|
| 184 | http://secunia.com/advisories/59132 |
|
|
| 185 | http://secunia.com/advisories/59135 |
|
|
| 186 | http://secunia.com/advisories/59135 |
|
|
| 187 | http://secunia.com/advisories/59142 |
|
|
| 188 | http://secunia.com/advisories/59142 |
|
|
| 189 | http://secunia.com/advisories/59162 |
|
|
| 190 | http://secunia.com/advisories/59162 |
|
|
| 191 | http://secunia.com/advisories/59163 |
|
|
| 192 | http://secunia.com/advisories/59163 |
|
|
| 193 | http://secunia.com/advisories/59167 |
|
|
| 194 | http://secunia.com/advisories/59167 |
|
|
| 195 | http://secunia.com/advisories/59175 |
|
|
| 196 | http://secunia.com/advisories/59175 |
|
|
| 197 | http://secunia.com/advisories/59186 |
|
|
| 198 | http://secunia.com/advisories/59186 |
|
|
| 199 | http://secunia.com/advisories/59188 |
|
|
| 200 | http://secunia.com/advisories/59188 |
|
|
| 201 | http://secunia.com/advisories/59189 |
|
|
| 202 | http://secunia.com/advisories/59189 |
|
|
| 203 | http://secunia.com/advisories/59190 |
|
|
| 204 | http://secunia.com/advisories/59190 |
|
|
| 205 | http://secunia.com/advisories/59191 |
|
|
| 206 | http://secunia.com/advisories/59191 |
|
|
| 207 | http://secunia.com/advisories/59192 |
|
|
| 208 | http://secunia.com/advisories/59192 |
|
|
| 209 | http://secunia.com/advisories/59202 |
|
|
| 210 | http://secunia.com/advisories/59202 |
|
|
| 211 | http://secunia.com/advisories/59211 |
|
|
| 212 | http://secunia.com/advisories/59211 |
|
|
| 213 | http://secunia.com/advisories/59214 |
|
|
| 214 | http://secunia.com/advisories/59214 |
|
|
| 215 | http://secunia.com/advisories/59215 |
|
|
| 216 | http://secunia.com/advisories/59215 |
|
|
| 217 | http://secunia.com/advisories/59223 |
|
|
| 218 | http://secunia.com/advisories/59223 |
|
|
| 219 | http://secunia.com/advisories/59231 |
|
|
| 220 | http://secunia.com/advisories/59231 |
|
|
| 221 | http://secunia.com/advisories/59264 |
|
|
| 222 | http://secunia.com/advisories/59264 |
|
|
| 223 | http://secunia.com/advisories/59282 |
|
|
| 224 | http://secunia.com/advisories/59282 |
|
|
| 225 | http://secunia.com/advisories/59284 |
|
|
| 226 | http://secunia.com/advisories/59284 |
|
|
| 227 | http://secunia.com/advisories/59287 |
|
|
| 228 | http://secunia.com/advisories/59287 |
|
|
| 229 | http://secunia.com/advisories/59300 |
|
|
| 230 | http://secunia.com/advisories/59300 |
|
|
| 231 | http://secunia.com/advisories/59301 |
|
|
| 232 | http://secunia.com/advisories/59301 |
|
|
| 233 | http://secunia.com/advisories/59305 |
|
|
| 234 | http://secunia.com/advisories/59305 |
|
|
| 235 | http://secunia.com/advisories/59306 |
|
|
| 236 | http://secunia.com/advisories/59306 |
|
|
| 237 | http://secunia.com/advisories/59310 |
|
|
| 238 | http://secunia.com/advisories/59310 |
|
|
| 239 | http://secunia.com/advisories/59325 |
|
|
| 240 | http://secunia.com/advisories/59325 |
|
|
| 241 | http://secunia.com/advisories/59338 |
|
|
| 242 | http://secunia.com/advisories/59338 |
|
|
| 243 | http://secunia.com/advisories/59342 |
|
|
| 244 | http://secunia.com/advisories/59342 |
|
|
| 245 | http://secunia.com/advisories/59347 |
|
|
| 246 | http://secunia.com/advisories/59347 |
|
|
| 247 | http://secunia.com/advisories/59354 |
|
|
| 248 | http://secunia.com/advisories/59354 |
|
|
| 249 | http://secunia.com/advisories/59362 |
|
|
| 250 | http://secunia.com/advisories/59362 |
|
|
| 251 | http://secunia.com/advisories/59364 |
|
|
| 252 | http://secunia.com/advisories/59364 |
|
|
| 253 | http://secunia.com/advisories/59365 |
|
|
| 254 | http://secunia.com/advisories/59365 |
|
|
| 255 | http://secunia.com/advisories/59368 |
|
|
| 256 | http://secunia.com/advisories/59368 |
|
|
| 257 | http://secunia.com/advisories/59370 |
|
|
| 258 | http://secunia.com/advisories/59370 |
|
|
| 259 | http://secunia.com/advisories/59374 |
|
|
| 260 | http://secunia.com/advisories/59374 |
|
|
| 261 | http://secunia.com/advisories/59375 |
|
|
| 262 | http://secunia.com/advisories/59375 |
|
|
| 263 | http://secunia.com/advisories/59380 |
|
|
| 264 | http://secunia.com/advisories/59380 |
|
|
| 265 | http://secunia.com/advisories/59383 |
|
|
| 266 | http://secunia.com/advisories/59383 |
|
|
| 267 | http://secunia.com/advisories/59389 |
|
|
| 268 | http://secunia.com/advisories/59389 |
|
|
| 269 | http://secunia.com/advisories/59413 |
|
|
| 270 | http://secunia.com/advisories/59413 |
|
|
| 271 | http://secunia.com/advisories/59429 |
|
|
| 272 | http://secunia.com/advisories/59429 |
|
|
| 273 | http://secunia.com/advisories/59435 |
|
|
| 274 | http://secunia.com/advisories/59435 |
|
|
| 275 | http://secunia.com/advisories/59437 |
|
|
| 276 | http://secunia.com/advisories/59437 |
|
|
| 277 | http://secunia.com/advisories/59438 |
|
|
| 278 | http://secunia.com/advisories/59438 |
|
|
| 279 | http://secunia.com/advisories/59440 |
|
|
| 280 | http://secunia.com/advisories/59440 |
|
|
| 281 | http://secunia.com/advisories/59441 |
|
|
| 282 | http://secunia.com/advisories/59441 |
|
|
| 283 | http://secunia.com/advisories/59442 |
|
|
| 284 | http://secunia.com/advisories/59442 |
|
|
| 285 | http://secunia.com/advisories/59444 |
|
|
| 286 | http://secunia.com/advisories/59444 |
|
|
| 287 | http://secunia.com/advisories/59445 |
|
|
| 288 | http://secunia.com/advisories/59445 |
|
|
| 289 | http://secunia.com/advisories/59446 |
|
|
| 290 | http://secunia.com/advisories/59446 |
|
|
| 291 | http://secunia.com/advisories/59447 |
|
|
| 292 | http://secunia.com/advisories/59447 |
|
|
| 293 | http://secunia.com/advisories/59448 |
|
|
| 294 | http://secunia.com/advisories/59448 |
|
|
| 295 | http://secunia.com/advisories/59449 |
|
|
| 296 | http://secunia.com/advisories/59449 |
|
|
| 297 | http://secunia.com/advisories/59450 |
|
|
| 298 | http://secunia.com/advisories/59450 |
|
|
| 299 | http://secunia.com/advisories/59451 |
|
|
| 300 | http://secunia.com/advisories/59451 |
|
|
| 301 | http://secunia.com/advisories/59454 |
|
|
| 302 | http://secunia.com/advisories/59454 |
|
|
| 303 | http://secunia.com/advisories/59459 |
|
|
| 304 | http://secunia.com/advisories/59459 |
|
|
| 305 | http://secunia.com/advisories/59460 |
|
|
| 306 | http://secunia.com/advisories/59460 |
|
|
| 307 | http://secunia.com/advisories/59483 |
|
|
| 308 | http://secunia.com/advisories/59483 |
|
|
| 309 | http://secunia.com/advisories/59490 |
|
|
| 310 | http://secunia.com/advisories/59490 |
|
|
| 311 | http://secunia.com/advisories/59491 |
|
|
| 312 | http://secunia.com/advisories/59491 |
|
|
| 313 | http://secunia.com/advisories/59495 |
|
|
| 314 | http://secunia.com/advisories/59495 |
|
|
| 315 | http://secunia.com/advisories/59502 |
|
|
| 316 | http://secunia.com/advisories/59502 |
|
|
| 317 | http://secunia.com/advisories/59506 |
|
|
| 318 | http://secunia.com/advisories/59506 |
|
|
| 319 | http://secunia.com/advisories/59514 |
|
|
| 320 | http://secunia.com/advisories/59514 |
|
|
| 321 | http://secunia.com/advisories/59518 |
|
|
| 322 | http://secunia.com/advisories/59518 |
|
|
| 323 | http://secunia.com/advisories/59525 |
|
|
| 324 | http://secunia.com/advisories/59525 |
|
|
| 325 | http://secunia.com/advisories/59528 |
|
|
| 326 | http://secunia.com/advisories/59528 |
|
|
| 327 | http://secunia.com/advisories/59529 |
|
|
| 328 | http://secunia.com/advisories/59529 |
|
|
| 329 | http://secunia.com/advisories/59530 |
|
|
| 330 | http://secunia.com/advisories/59530 |
|
|
| 331 | http://secunia.com/advisories/59589 |
|
|
| 332 | http://secunia.com/advisories/59589 |
|
|
| 333 | http://secunia.com/advisories/59602 |
|
|
| 334 | http://secunia.com/advisories/59602 |
|
|
| 335 | http://secunia.com/advisories/59655 |
|
|
| 336 | http://secunia.com/advisories/59655 |
|
|
| 337 | http://secunia.com/advisories/59659 |
|
|
| 338 | http://secunia.com/advisories/59659 |
|
|
| 339 | http://secunia.com/advisories/59661 |
|
|
| 340 | http://secunia.com/advisories/59661 |
|
|
| 341 | http://secunia.com/advisories/59666 |
|
|
| 342 | http://secunia.com/advisories/59666 |
|
|
| 343 | http://secunia.com/advisories/59669 |
|
|
| 344 | http://secunia.com/advisories/59669 |
|
|
| 345 | http://secunia.com/advisories/59677 |
|
|
| 346 | http://secunia.com/advisories/59677 |
|
|
| 347 | http://secunia.com/advisories/59721 |
|
|
| 348 | http://secunia.com/advisories/59721 |
|
|
| 349 | http://secunia.com/advisories/59784 |
|
|
| 350 | http://secunia.com/advisories/59784 |
|
|
| 351 | http://secunia.com/advisories/59824 |
|
|
| 352 | http://secunia.com/advisories/59824 |
|
|
| 353 | http://secunia.com/advisories/59827 |
|
|
| 354 | http://secunia.com/advisories/59827 |
|
|
| 355 | http://secunia.com/advisories/59878 |
|
|
| 356 | http://secunia.com/advisories/59878 |
|
|
| 357 | http://secunia.com/advisories/59885 |
|
|
| 358 | http://secunia.com/advisories/59885 |
|
|
| 359 | http://secunia.com/advisories/59894 |
|
|
| 360 | http://secunia.com/advisories/59894 |
|
|
| 361 | http://secunia.com/advisories/59916 |
|
|
| 362 | http://secunia.com/advisories/59916 |
|
|
| 363 | http://secunia.com/advisories/59990 |
|
|
| 364 | http://secunia.com/advisories/59990 |
|
|
| 365 | http://secunia.com/advisories/60049 |
|
|
| 366 | http://secunia.com/advisories/60049 |
|
|
| 367 | http://secunia.com/advisories/60066 |
|
|
| 368 | http://secunia.com/advisories/60066 |
|
|
| 369 | http://secunia.com/advisories/60176 |
|
|
| 370 | http://secunia.com/advisories/60176 |
|
|
| 371 | http://secunia.com/advisories/60522 |
|
|
| 372 | http://secunia.com/advisories/60522 |
|
|
| 373 | http://secunia.com/advisories/60567 |
|
|
| 374 | http://secunia.com/advisories/60567 |
|
|
| 375 | http://secunia.com/advisories/60571 |
|
|
| 376 | http://secunia.com/advisories/60571 |
|
|
| 377 | http://secunia.com/advisories/60577 |
|
|
| 378 | http://secunia.com/advisories/60577 |
|
|
| 379 | http://secunia.com/advisories/60819 |
|
|
| 380 | http://secunia.com/advisories/60819 |
|
|
| 381 | http://secunia.com/advisories/61254 |
|
|
| 382 | http://secunia.com/advisories/61254 |
|
|
| 383 | http://secunia.com/advisories/61815 |
|
|
| 384 | http://secunia.com/advisories/61815 |
|
|
| 385 | http://security.gentoo.org/glsa/glsa-201407-05.xml |
|
|
| 386 | http://security.gentoo.org/glsa/glsa-201407-05.xml |
|
|
| 387 | http://support.apple.com/kb/HT6443 |
|
|
| 388 | http://support.apple.com/kb/HT6443 |
|
|
| 389 | http://support.citrix.com/article/CTX140876 |
|
|
| 390 | http://support.citrix.com/article/CTX140876 |
|
|
| 391 | http://support.f5.com/kb/en-us/solutions/public/15000/300/sol15325.html |
|
|
| 392 | http://support.f5.com/kb/en-us/solutions/public/15000/300/sol15325.html |
|
|
| 393 | http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140605-openssl |
|
|
| 394 | http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140605-openssl |
|
|
| 395 | http://www.blackberry.com/btsc/KB36051 |
|
|
| 396 | http://www.blackberry.com/btsc/KB36051 |
|
|
| 397 | http://www.fortiguard.com/advisory/FG-IR-14-018/ |
|
|
| 398 | http://www.fortiguard.com/advisory/FG-IR-14-018/ |
|
|
| 399 | http://www.f-secure.com/en/web/labs_global/fsc-2014-6 |
|
|
| 400 | http://www.f-secure.com/en/web/labs_global/fsc-2014-6 |
|
|
| 401 | http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-345106.htm |
|
|
| 402 | http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-345106.htm |
|
|
| 403 | http://www.ibm.com/support/docview.wss?uid=isg3T1020948 |
|
|
| 404 | http://www.ibm.com/support/docview.wss?uid=isg3T1020948 |
|
|
| 405 | http://www.ibm.com/support/docview.wss?uid=ssg1S1004678 |
|
|
| 406 | http://www.ibm.com/support/docview.wss?uid=ssg1S1004678 |
|
|
| 407 | http://www.ibm.com/support/docview.wss?uid=swg1IT02314 |
|
|
| 408 | http://www.ibm.com/support/docview.wss?uid=swg1IT02314 |
|
|
| 409 | http://www.ibm.com/support/docview.wss?uid=swg21676356 |
|
|
| 410 | http://www.ibm.com/support/docview.wss?uid=swg21676356 |
|
|
| 411 | http://www.ibm.com/support/docview.wss?uid=swg21676793 |
|
|
| 412 | http://www.ibm.com/support/docview.wss?uid=swg21676793 |
|
|
| 413 | http://www.ibm.com/support/docview.wss?uid=swg21676877 |
|
|
| 414 | http://www.ibm.com/support/docview.wss?uid=swg21676877 |
|
|
| 415 | http://www.ibm.com/support/docview.wss?uid=swg24037783 |
|
|
| 416 | http://www.ibm.com/support/docview.wss?uid=swg24037783 |
|
|
| 417 | http://www.innominate.com/data/downloads/manuals/mdm_1.5.2.1_Release_Notes.pdf |
|
|
| 418 | http://www.innominate.com/data/downloads/manuals/mdm_1.5.2.1_Release_Notes.pdf |
|
|
| 419 | http://www.kb.cert.org/vuls/id/978508 |
|
|
| 420 | http://www.kb.cert.org/vuls/id/978508 |
|
|
| 421 | http://www.kerio.com/support/kerio-control/release-history |
|
|
| 422 | http://www.kerio.com/support/kerio-control/release-history |
|
|
| 423 | http://www.mandriva.com/security/advisories?name=MDVSA-2014:105 |
|
|
| 424 | http://www.mandriva.com/security/advisories?name=MDVSA-2014:105 |
|
|
| 425 | http://www.mandriva.com/security/advisories?name=MDVSA-2014:106 |
|
|
| 426 | http://www.mandriva.com/security/advisories?name=MDVSA-2014:106 |
|
|
| 427 | http://www.mandriva.com/security/advisories?name=MDVSA-2015:062 |
|
|
| 428 | http://www.mandriva.com/security/advisories?name=MDVSA-2015:062 |
|
|
| 429 | http://www.novell.com/support/kb/doc.php?id=7015264 |
|
|
| 430 | http://www.novell.com/support/kb/doc.php?id=7015264 |
|
|
| 431 | http://www.novell.com/support/kb/doc.php?id=7015300 |
|
|
| 432 | http://www.novell.com/support/kb/doc.php?id=7015300 |
|
|
| 433 | http://www.openssl.org/news/secadv_20140605.txt |
|
|
| 434 | http://www.openssl.org/news/secadv_20140605.txt |
|
|
| 435 | http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html |
|
|
| 436 | http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html |
|
|
| 437 | http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html |
|
|
| 438 | http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html |
|
|
| 439 | http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html |
|
|
| 440 | http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html |
|
|
| 441 | http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html |
|
|
| 442 | http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html |
|
|
| 443 | http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html |
|
|
| 444 | http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html |
|
|
| 445 | http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html |
|
|
| 446 | http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html |
|
|
| 447 | http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html |
|
|
| 448 | http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html |
|
|
| 449 | http://www.securityfocus.com/archive/1/534161/100/0/threaded |
|
|
| 450 | http://www.securityfocus.com/archive/1/534161/100/0/threaded |
|
|
| 451 | http://www.securitytracker.com/id/1031032 |
|
|
| 452 | http://www.securitytracker.com/id/1031032 |
|
|
| 453 | http://www.securitytracker.com/id/1031594 |
|
|
| 454 | http://www.securitytracker.com/id/1031594 |
|
|
| 455 | http://www.splunk.com/view/SP-CAAAM2D |
|
|
| 456 | http://www.splunk.com/view/SP-CAAAM2D |
|
|
| 457 | http://www.tenable.com/blog/nessus-527-and-pvs-403-are-available-for-download |
|
|
| 458 | http://www.tenable.com/blog/nessus-527-and-pvs-403-are-available-for-download |
|
|
| 459 | http://www.vmware.com/security/advisories/VMSA-2014-0006.html |
|
|
| 460 | http://www.vmware.com/security/advisories/VMSA-2014-0006.html |
|
|
| 461 | http://www.vmware.com/security/advisories/VMSA-2014-0012.html |
|
|
| 462 | http://www.vmware.com/security/advisories/VMSA-2014-0012.html |
|
|
| 463 | http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0 |
|
|
| 464 | http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0 |
|
|
| 465 | http://www-01.ibm.com/support/docview.wss?uid=isg400001841 |
|
|
| 466 | http://www-01.ibm.com/support/docview.wss?uid=isg400001841 |
|
|
| 467 | http://www-01.ibm.com/support/docview.wss?uid=isg400001843 |
|
|
| 468 | http://www-01.ibm.com/support/docview.wss?uid=isg400001843 |
|
|
| 469 | http://www-01.ibm.com/support/docview.wss?uid=nas8N1020163 |
|
|
| 470 | http://www-01.ibm.com/support/docview.wss?uid=nas8N1020163 |
|
|
| 471 | http://www-01.ibm.com/support/docview.wss?uid=nas8N1020172 |
|
|
| 472 | http://www-01.ibm.com/support/docview.wss?uid=nas8N1020172 |
|
|
| 473 | http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004690 |
|
|
| 474 | http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004690 |
|
|
| 475 | http://www-01.ibm.com/support/docview.wss?uid=swg1IV61506 |
|
|
| 476 | http://www-01.ibm.com/support/docview.wss?uid=swg1IV61506 |
|
|
| 477 | http://www-01.ibm.com/support/docview.wss?uid=swg21673137 |
|
|
| 478 | http://www-01.ibm.com/support/docview.wss?uid=swg21673137 |
|
|
| 479 | http://www-01.ibm.com/support/docview.wss?uid=swg21675626 |
|
|
| 480 | http://www-01.ibm.com/support/docview.wss?uid=swg21675626 |
|
|
| 481 | http://www-01.ibm.com/support/docview.wss?uid=swg21675821 |
|
|
| 482 | http://www-01.ibm.com/support/docview.wss?uid=swg21675821 |
|
|
| 483 | http://www-01.ibm.com/support/docview.wss?uid=swg21676035 |
|
|
| 484 | http://www-01.ibm.com/support/docview.wss?uid=swg21676035 |
|
|
| 485 | http://www-01.ibm.com/support/docview.wss?uid=swg21676062 |
|
|
| 486 | http://www-01.ibm.com/support/docview.wss?uid=swg21676062 |
|
|
| 487 | http://www-01.ibm.com/support/docview.wss?uid=swg21676071 |
|
|
| 488 | http://www-01.ibm.com/support/docview.wss?uid=swg21676071 |
|
|
| 489 | http://www-01.ibm.com/support/docview.wss?uid=swg21676333 |
|
|
| 490 | http://www-01.ibm.com/support/docview.wss?uid=swg21676333 |
|
|
| 491 | http://www-01.ibm.com/support/docview.wss?uid=swg21676334 |
|
|
| 492 | http://www-01.ibm.com/support/docview.wss?uid=swg21676334 |
|
|
| 493 | http://www-01.ibm.com/support/docview.wss?uid=swg21676419 |
|
|
| 494 | http://www-01.ibm.com/support/docview.wss?uid=swg21676419 |
|
|
| 495 | http://www-01.ibm.com/support/docview.wss?uid=swg21676478 |
|
|
| 496 | http://www-01.ibm.com/support/docview.wss?uid=swg21676478 |
|
|
| 497 | http://www-01.ibm.com/support/docview.wss?uid=swg21676496 |
|
|
| 498 | http://www-01.ibm.com/support/docview.wss?uid=swg21676496 |
|
|
| 499 | http://www-01.ibm.com/support/docview.wss?uid=swg21676501 |
|
|
| 500 | http://www-01.ibm.com/support/docview.wss?uid=swg21676501 |
|
|
| 501 | http://www-01.ibm.com/support/docview.wss?uid=swg21676529 |
|
|
| 502 | http://www-01.ibm.com/support/docview.wss?uid=swg21676529 |
|
|
| 503 | http://www-01.ibm.com/support/docview.wss?uid=swg21676536 |
|
|
| 504 | http://www-01.ibm.com/support/docview.wss?uid=swg21676536 |
|
|
| 505 | http://www-01.ibm.com/support/docview.wss?uid=swg21676615 |
|
|
| 506 | http://www-01.ibm.com/support/docview.wss?uid=swg21676615 |
|
|
| 507 | http://www-01.ibm.com/support/docview.wss?uid=swg21676644 |
|
|
| 508 | http://www-01.ibm.com/support/docview.wss?uid=swg21676644 |
|
|
| 509 | http://www-01.ibm.com/support/docview.wss?uid=swg21676655 |
|
|
| 510 | http://www-01.ibm.com/support/docview.wss?uid=swg21676655 |
|
|
| 511 | http://www-01.ibm.com/support/docview.wss?uid=swg21676786 |
|
|
| 512 | http://www-01.ibm.com/support/docview.wss?uid=swg21676786 |
|
|
| 513 | http://www-01.ibm.com/support/docview.wss?uid=swg21676833 |
|
|
| 514 | http://www-01.ibm.com/support/docview.wss?uid=swg21676833 |
|
|
| 515 | http://www-01.ibm.com/support/docview.wss?uid=swg21676845 |
|
|
| 516 | http://www-01.ibm.com/support/docview.wss?uid=swg21676845 |
|
|
| 517 | http://www-01.ibm.com/support/docview.wss?uid=swg21676879 |
|
|
| 518 | http://www-01.ibm.com/support/docview.wss?uid=swg21676879 |
|
|
| 519 | http://www-01.ibm.com/support/docview.wss?uid=swg21676889 |
|
|
| 520 | http://www-01.ibm.com/support/docview.wss?uid=swg21676889 |
|
|
| 521 | http://www-01.ibm.com/support/docview.wss?uid=swg21677080 |
|
|
| 522 | http://www-01.ibm.com/support/docview.wss?uid=swg21677080 |
|
|
| 523 | http://www-01.ibm.com/support/docview.wss?uid=swg21677131 |
|
|
| 524 | http://www-01.ibm.com/support/docview.wss?uid=swg21677131 |
|
|
| 525 | http://www-01.ibm.com/support/docview.wss?uid=swg21677390 |
|
|
| 526 | http://www-01.ibm.com/support/docview.wss?uid=swg21677390 |
|
|
| 527 | http://www-01.ibm.com/support/docview.wss?uid=swg21677527 |
|
|
| 528 | http://www-01.ibm.com/support/docview.wss?uid=swg21677527 |
|
|
| 529 | http://www-01.ibm.com/support/docview.wss?uid=swg21677567 |
|
|
| 530 | http://www-01.ibm.com/support/docview.wss?uid=swg21677567 |
|
|
| 531 | http://www-01.ibm.com/support/docview.wss?uid=swg21677695 |
|
|
| 532 | http://www-01.ibm.com/support/docview.wss?uid=swg21677695 |
|
|
| 533 | http://www-01.ibm.com/support/docview.wss?uid=swg21677828 |
|
|
| 534 | http://www-01.ibm.com/support/docview.wss?uid=swg21677828 |
|
|
| 535 | http://www-01.ibm.com/support/docview.wss?uid=swg21677836 |
|
|
| 536 | http://www-01.ibm.com/support/docview.wss?uid=swg21677836 |
|
|
| 537 | http://www-01.ibm.com/support/docview.wss?uid=swg21678167 |
|
|
| 538 | http://www-01.ibm.com/support/docview.wss?uid=swg21678167 |
|
|
| 539 | http://www-01.ibm.com/support/docview.wss?uid=swg21678233 |
|
|
| 540 | http://www-01.ibm.com/support/docview.wss?uid=swg21678233 |
|
|
| 541 | http://www-01.ibm.com/support/docview.wss?uid=swg21678289 |
|
|
| 542 | http://www-01.ibm.com/support/docview.wss?uid=swg21678289 |
|
|
| 543 | http://www-01.ibm.com/support/docview.wss?uid=swg21683332 |
|
|
| 544 | http://www-01.ibm.com/support/docview.wss?uid=swg21683332 |
|
|
| 545 | http://www-01.ibm.com/support/docview.wss?uid=swg24037727 |
|
|
| 546 | http://www-01.ibm.com/support/docview.wss?uid=swg24037727 |
|
|
| 547 | http://www-01.ibm.com/support/docview.wss?uid=swg24037729 |
|
|
| 548 | http://www-01.ibm.com/support/docview.wss?uid=swg24037729 |
|
|
| 549 | http://www-01.ibm.com/support/docview.wss?uid=swg24037730 |
|
|
| 550 | http://www-01.ibm.com/support/docview.wss?uid=swg24037730 |
|
|
| 551 | http://www-01.ibm.com/support/docview.wss?uid=swg24037731 |
|
|
| 552 | http://www-01.ibm.com/support/docview.wss?uid=swg24037731 |
|
|
| 553 | http://www-01.ibm.com/support/docview.wss?uid=swg24037732 |
|
|
| 554 | http://www-01.ibm.com/support/docview.wss?uid=swg24037732 |
|
|
| 555 | http://www-01.ibm.com/support/docview.wss?uid=swg24037761 |
|
|
| 556 | http://www-01.ibm.com/support/docview.wss?uid=swg24037761 |
|
|
| 557 | http://www-01.ibm.com/support/docview.wss?uid=swg24037870 |
|
|
| 558 | http://www-01.ibm.com/support/docview.wss?uid=swg24037870 |
|
|
| 559 | http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=6060&myns=phmc&mync=E |
|
|
| 560 | http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=6060&myns=phmc&mync=E |
|
|
| 561 | http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=6061&myns=phmc&mync=E |
|
|
| 562 | http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=6061&myns=phmc&mync=E |
|
|
| 563 | http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5095737 |
|
|
| 564 | http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5095737 |
|
|
| 565 | http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095740 |
|
|
| 566 | http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095740 |
|
|
| 567 | http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095754 |
|
|
| 568 | http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095754 |
|
|
| 569 | http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095755 |
|
|
| 570 | http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095755 |
|
|
| 571 | http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095756 |
|
|
| 572 | http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095756 |
|
|
| 573 | http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095757 |
|
|
| 574 | http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095757 |
|
|
| 575 | https://access.redhat.com/site/blogs/766093/posts/908133 |
|
|
| 576 | https://access.redhat.com/site/blogs/766093/posts/908133 |
|
|
| 577 | https://blogs.oracle.com/sunsecurity/entry/cve_2014_0224_cryptographic_issues |
|
|
| 578 | https://blogs.oracle.com/sunsecurity/entry/cve_2014_0224_cryptographic_issues |
|
|
| 579 | https://blogs.oracle.com/sunsecurity/entry/cve_2014_0224_cryptographic_issues1 |
|
|
| 580 | https://blogs.oracle.com/sunsecurity/entry/cve_2014_0224_cryptographic_issues1 |
|
|
| 581 | https://bugzilla.redhat.com/show_bug.cgi?id=1103586 |
|
|
| 582 | https://bugzilla.redhat.com/show_bug.cgi?id=1103586 |
|
|
| 583 | https://cert-portal.siemens.com/productcert/pdf/ssa-234763.pdf |
|
|
| 584 | https://cert-portal.siemens.com/productcert/pdf/ssa-234763.pdf |
|
|
| 585 | https://discussions.nessus.org/thread/7517 |
|
|
| 586 | https://discussions.nessus.org/thread/7517 |
|
|
| 587 | https://filezilla-project.org/versions.php?type=server |
|
|
| 588 | https://filezilla-project.org/versions.php?type=server |
|
|
| 589 | https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=bc8923b1ec9c467755cd86f7848c50ee8812e441 | ||
| 590 | https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=bc8923b1ec9c467755cd86f7848c50ee8812e441 | ||
| 591 | https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05301946 |
|
|
| 592 | https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05301946 |
|
|
| 593 | https://kb.bluecoat.com/index?page=content&id=SA80 |
|
|
| 594 | https://kb.bluecoat.com/index?page=content&id=SA80 |
|
|
| 595 | https://kc.mcafee.com/corporate/index?page=content&id=SB10075 |
|
|
| 596 | https://kc.mcafee.com/corporate/index?page=content&id=SB10075 |
|
|
| 597 | https://www.arista.com/en/support/advisories-notices/security-advisories/941-security-advisory-0005 |
|
|
| 598 | https://www.arista.com/en/support/advisories-notices/security-advisories/941-security-advisory-0005 |
|
|
| 599 | https://www.ibm.com/support/docview.wss?uid=ssg1S1004670 |
|
|
| 600 | https://www.ibm.com/support/docview.wss?uid=ssg1S1004670 |
|
|
| 601 | https://www.ibm.com/support/docview.wss?uid=ssg1S1004671 |
|
|
| 602 | https://www.ibm.com/support/docview.wss?uid=ssg1S1004671 |
|
|
| 603 | https://www.imperialviolet.org/2014/06/05/earlyccs.html |
|
|
| 604 | https://www.imperialviolet.org/2014/06/05/earlyccs.html |
|
|
| 605 | https://www.intersectalliance.com/wp-content/uploads/release_notes/ReleaseNotes_for_SNARE_for_MSSQL.pdf |
|
|
| 606 | https://www.intersectalliance.com/wp-content/uploads/release_notes/ReleaseNotes_for_SNARE_for_MSSQL.pdf |
|
|
| 607 | https://www.intersectalliance.com/wp-content/uploads/release_notes/ReleaseNotes_for_Snare_for_Windows.pdf |
|
|
| 608 | https://www.intersectalliance.com/wp-content/uploads/release_notes/ReleaseNotes_for_Snare_for_Windows.pdf |
|
|
| 609 | https://www.novell.com/support/kb/doc.php?id=7015271 |
|
|
| 610 | https://www.novell.com/support/kb/doc.php?id=7015271 |
|
| No | CWE | Name | URL |
|---|---|---|---|
| 1 | CWE-326 | 不適切な暗号強度 | https://cwe.mitre.org/data/definitions/326.html |
| Title | OpenSSL における Change Cipher Spec メッセージの処理に脆弱性 |
|---|---|
| Summary | OpenSSL には、初期 SSL/TLS ハンドシェイクにおける Change Cipher Spec メッセージの処理に脆弱性が存在します。 最初の SSL/TLS ハンドシェイクでは、暗号化通信で使われる暗号化鍵を生成するために鍵情報の交換を行い、それに続き Change Cipher Spec メッセージがサーバからクライアントへ、クライアントからサーバへ送られます。 OpenSSL には、Change Cipher Spec プロトコルの実装に問題があり、鍵情報の交換の前に Change Cipher Spec メッセージを受け取ると、空の鍵情報を使って暗号化鍵を生成してしまいます (CWE-325)。 この脆弱性情報は、情報セキュリティ早期警戒パートナーシップに基づき下記の方が IPA に報告し、JPCERT/CC が開発者との調整を行いました。 報告者: 株式会社レピダム 菊池正史 氏 |
| Possible impacts | サーバとクライアント間の SSL/TLS 通信が、中間者攻撃 (man-in-the-middle attack) によって解読されたり、改ざんされたりする可能性があります。 |
| Solution | [アップデートする] 開発者が提供する情報をもとに最新版へアップデートしてください。 |
| Publication Date | June 6, 2014, midnight |
| Registration Date | June 6, 2014, 12:01 p.m. |
| Last Update | Nov. 22, 2016, 4 p.m. |
| OpenSSL Project |
| OpenSSL 1.0.1 系列のうち OpenSSL 1.0.1g およびそれ以前 |
| No | Name | URL |
|---|---|---|
| Common Vulnerabilities and Exposures (CVE) | ||
| 1 | CVE-2014-0224 | //cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0224 |
| National Vulnerability Database (NVD) | ||
| 2 | CVE-2014-0224 | http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-0224 |
| Puppet | ||
| 3 | CVE-2014-0224 | http://puppetlabs.com/security/cve/cve-2014-0224 |
| SECURITY BLOG | ||
| 4 | CVE-2014-0224 Cryptographic Issues vulnerability in OpenSSL | https://blogs.oracle.com/sunsecurity/entry/cve_2014_0224_cryptographic_issues1 |
| 5 | CVE-2014-0224 Cryptographic Issues vulnerability in WAN Boot | https://blogs.oracle.com/sunsecurity/entry/cve_2014_0224_cryptographic_issues |
| No | Name | URL |
|---|---|---|
| JVNDB | ||
| 1 | CWE-Other | https://www.ipa.go.jp/security/vuln/CWE.html#CWEOther |
| No | Name | URL |
|---|---|---|
| Apple Security Updates | ||
| 1 | HT6443 | http://support.apple.com/kb/HT6443 |
| Apple セキュリティアップデート | ||
| 2 | HT6443 | http://support.apple.com/kb/HT6443?viewlocale=ja_JP |
| Asianux Technical Support Network | ||
| 3 | openssl-0.9.8e-27.AXS3.3 | https://tsn.miraclelinux.com/tsn_local/index.php?m=errata&a=detail&eid=3749&sType=&sProduct=&published=1 |
| 4 | openssl-1.0.1e-16.AXS4.14 | https://tsn.miraclelinux.com/tsn_local/index.php?m=errata&a=detail&eid=3747&sType=&sProduct=&published=1 |
| 5 | openssl097a-0.9.7a-12.AXS3.1 | https://tsn.miraclelinux.com/tsn_local/index.php?m=errata&a=detail&eid=3750&sType=&sProduct=&published=1 |
| 6 | openssl098e-0.9.8e-18.AXS4.2 | https://tsn.miraclelinux.com/tsn_local/index.php?m=errata&a=detail&eid=3748&sType=&sProduct=&published=1 |
| BlackBerry Knowledge Base | ||
| 7 | KB36051 | http://btsc.webapps.blackberry.com/btsc/viewdocument.do;jsessionid=D8D85AAEDAC42CA663FA1479E20410CD?externalId=KB36051&sliceId=1&cmd=displayKC&docType=kc&noCount=true&ViewedDocsListHelper=com.kanisa.a |
| Cisco Security Advisory | ||
| 8 | cisco-sa-20140605-openssl | http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140605-openssl |
| FileZilla | ||
| 9 | Version history | https://filezilla-project.org/versions.php?type=server |
| FortiGuard Security Advisories | ||
| 10 | Multiple Vulnerabilities in OpenSSL | http://www.fortiguard.com/advisory/FG-IR-14-018/ |
| Hitachi Incdent Response Team | ||
| 11 | HIRT-PUB14010 | http://www.hitachi.co.jp/hirt/publications/hirt-pub14010/index.html |
| Hitachi Software Vulnerability Information | ||
| 12 | HS15-012 | http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS15-012/index.html |
| HP Security Bulletin | ||
| 13 | HPSBMU03053 SSRT101613 | http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c04347711 |
| 14 | HPSBMU03058 SSRT101591 | http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c04351097 |
| 15 | HPSBMU03070 SSRT101637 | http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c04368546 |
| 16 | HPSBMU03216 | http://marc.info/?l=bugtraq&m=142350350616251&w=2 |
| 17 | HPSBST03195 | http://marc.info/?l=bugtraq&m=142805027510172&w=2 |
| 18 | HPSBST03265 | http://marc.info/?l=bugtraq&m=142546741516006&w=2 |
| IBM Support Document | ||
| 19 | 00001841 | http://www-01.ibm.com/support/docview.wss?uid=isg400001841 |
| 20 | 00001843 | http://www-01.ibm.com/support/docview.wss?uid=isg400001843 |
| 21 | 1676062 | http://www-01.ibm.com/support/docview.wss?uid=swg21676062 |
| 22 | 1676419 | http://www-01.ibm.com/support/docview.wss?uid=swg21676419 |
| 23 | 1676496 | http://www-01.ibm.com/support/docview.wss?uid=swg21676496 |
| 24 | 1676655 | http://www-01.ibm.com/support/docview.wss?uid=swg21676655 |
| 25 | 1676845 | http://www-01.ibm.com/support/docview.wss?uid=swg21676845 |
| 26 | 1677390 | http://www-01.ibm.com/support/docview.wss?uid=swg21677390 |
| 27 | 1677567 | http://www-01.ibm.com/support/docview.wss?uid=swg21677567 |
| 28 | 1677695 | http://www-01.ibm.com/support/docview.wss?uid=swg21677695 |
| 29 | 1677828 | http://www-01.ibm.com/support/docview.wss?uid=swg21677828 |
| 30 | 1678167 | http://www-01.ibm.com/support/docview.wss?uid=swg21678167 |
| 31 | 1678289 | http://www-01.ibm.com/support/docview.wss?uid=swg21678289 |
| 32 | 4037761 | http://www-01.ibm.com/support/docview.wss?uid=swg24037761 |
| 33 | IBM Flex System Integrated Management Module II (IMM2) is affected by the following OpenSSL vulnerability: CVE-2014-0224 | http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5095737 |
| 34 | IBM System Networking switches that are affected by the OpenSSL vulnerability: CVE-2014-0224 | http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095740 |
| 35 | N1020172 | http://www-01.ibm.com/support/docview.wss?uid=nas8N1020172 |
| 36 | S1004690 | http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004690 |
| InterSect Alliance International Pty | ||
| 37 | Release Notes for Snare Enterprise Agent for MSSQL v1.2 | https://www.intersectalliance.com/wp-content/uploads/release_notes/ReleaseNotes_for_SNARE_for_MSSQL.pdf |
| 38 | Release Notes for Snare Enterprise Agent for Windows v4.2 | https://www.intersectalliance.com/wp-content/uploads/release_notes/ReleaseNotes_for_Snare_for_Windows.pdf |
| JVN | ||
| 39 | アライドテレシス株式会社からの情報 | https://jvn.jp/jp/JVN61247051/522154/index.html |
| 40 | 横河電機株式会社からの情報 | http://jvn.jp/jp/JVN61247051/120418/index.html |
| Kerio Control | ||
| 41 | Kerio Control Release History | http://www.kerio.com/support/kerio-control/release-history |
| Knowledge Base | ||
| 42 | 2079783 | http://kb.vmware.com/selfservice/microsites/search.do?language=en_US&cmd=displayKC&externalId=2079783 |
| Knowledgebase | ||
| 43 | 7015264 | http://www.novell.com/support/kb/doc.php?id=7015264 |
| 44 | 7015300 | http://www.novell.com/support/kb/doc.php?id=7015300 |
| McAfee | ||
| 45 | SB10075 | https://kc.mcafee.com/corporate/index?page=content&id=SB10075 |
| MySQL | ||
| 46 | Changes in MySQL Workbench 6.1.7 (2014-06-27) | http://dev.mysql.com/doc/relnotes/workbench/en/wb-news-6-1-7.html |
| NEC製品セキュリティ情報 | ||
| 47 | AV14-002 | http://jpn.nec.com/security-info/av14-002.html |
| 48 | NV15-011 | http://jpn.nec.com/security-info/secinfo/nv15-011.html |
| OpenSSL | ||
| 49 | Fix for CVE-2014-0224 | https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=bc8923b1ec9c467755cd86f7848c50ee8812e441 |
| 50 | Tarballs | http://www.openssl.org/source/ |
| OpenSSL Security Advisory | ||
| 51 | OpenSSL Security Advisory [05 Jun 2014] SSL/TLS MITM vulnerability (CVE-2014-0224) | http://www.openssl.org/news/secadv_20140605.txt |
| Oracle | ||
| 52 | ELSA-2014-1053 | http://linux.oracle.com/errata/ELSA-2014-1053.html |
| Oracle Critical Patch Update | ||
| 53 | Oracle Critical Patch Update Advisory - January 2015 | http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html |
| 54 | Oracle Critical Patch Update Advisory - July 2014 | http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html |
| 55 | Oracle Critical Patch Update Advisory - July 2016 | http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html |
| 56 | Oracle Critical Patch Update Advisory - October 2014 | http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html |
| 57 | Oracle Critical Patch Update Advisory - October 2016 | http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html |
| 58 | Text Form of Oracle Critical Patch Update - January 2015 Risk Matrices | http://www.oracle.com/technetwork/topics/security/cpujan2015verbose-1972976.html |
| 59 | Text Form of Oracle Critical Patch Update - July 2014 Risk Matrices | http://www.oracle.com/technetwork/topics/security/cpujul2014verbose-1972958.html |
| 60 | Text Form of Oracle Critical Patch Update - July 2016 Risk Matrices | http://www.oracle.com/technetwork/topics/security/cpujul2016verbose-2881721.html |
| 61 | Text Form of Oracle Critical Patch Update - October 2014 Risk Matrices | http://www.oracle.com/technetwork/topics/security/cpuoct2014verbose-1972962.html |
| 62 | Text Form of Oracle Critical Patch Update - October 2016 Risk Matrices | http://www.oracle.com/technetwork/security-advisory/cpuoct2016verbose-2881725.html |
| Red Hat Bugzilla | ||
| 63 | Bug 1103586 | https://bugzilla.redhat.com/show_bug.cgi?id=1103586 |
| Red Hat Security Advisory | ||
| 64 | RHSA-2014:0624 | https://rhn.redhat.com/errata/RHSA-2014-0624.html |
| 65 | RHSA-2014:0626 | https://rhn.redhat.com/errata/RHSA-2014-0626.html |
| 66 | RHSA-2014:0627 | https://rhn.redhat.com/errata/RHSA-2014-0627.html |
| 67 | RHSA-2014:0630 | https://rhn.redhat.com/errata/RHSA-2014-0630.html |
| 68 | RHSA-2014:0631 | https://rhn.redhat.com/errata/RHSA-2014-0631.html |
| 69 | RHSA-2014:0632 | https://rhn.redhat.com/errata/RHSA-2014-0632.html |
| 70 | RHSA-2014:0633 | https://rhn.redhat.com/errata/RHSA-2014-0633.html |
| 71 | RHSA-2014:0680 | https://rhn.redhat.com/errata/RHSA-2014-0680.html |
| Red Hat Security Blog | ||
| 72 | OpenSSL MITM CCS injection attack (CVE-2014-0224) | https://access.redhat.com/site/blogs/766093/posts/908133 |
| RTシリーズのセキュリティに関するFAQ | ||
| 73 | OpenSSL「Change Cipher Specメッセージ処理」の脆弱性について | http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/VU978508.html |
| Security Advisories | ||
| 74 | SA80 | https://kb.bluecoat.com/index?page=content&id=SA80 |
| Security Advisory | ||
| 75 | Huawei-SA-20140613-OpenSSL | http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-345106.htm |
| SECURITY BLOG | ||
| 76 | January 2015 Critical Patch Update Released | https://blogs.oracle.com/security/entry/january_2015_critical_patch_update |
| 77 | July 2014 Critical Patch Update Released | https://blogs.oracle.com/security/entry/july_2014_critical_patch_update |
| 78 | July 2016 Critical Patch Update Released | https://blogs.oracle.com/security/entry/july_2016_critical_patch_update |
| 79 | October 2014 Critical Patch Update Released | https://blogs.oracle.com/security/entry/october_2014_critical_patch_update |
| 80 | October 2016 Critical Patch Update Released | https://blogs.oracle.com/security/entry/october_2016_critical_patch_update |
| Splunk | ||
| 81 | Splunk Enterprise 6.1.2, 6.0.5 and 5.0.9 address two vulnerabilities - July 1, 2014 | http://www.splunk.com/view/SP-CAAAM2D |
| Technical bulletin | ||
| 82 | Announcing PTF MH01438 for HMC Version 7 Release 7.6.0 Service Pack 3 | http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=6061&myns=phmc&mync=E |
| 83 | Announcing PTF MH01439 for HMC Version 7 Release 7.7.0 Service Pack 3 | http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=6060&myns=phmc&mync=E |
| Tenable Network Security | ||
| 84 | Nessus 5.2.7 and PVS 4.0.3 Are Available for Download | http://www.tenable.com/blog/nessus-527-and-pvs-403-are-available-for-download |
| 85 | Nessus 5.2.7 Now Available | https://discussions.nessus.org/thread/7517 |
| Turbolinux Security Advisory | ||
| 86 | TLSA-2014-3 | http://www.turbolinux.co.jp/security/2014/TLSA-2014-3j.html |
| VMware Security Advisories | ||
| 87 | VMSA-2014-0006 | http://www.vmware.com/security/advisories/VMSA-2014-0006.html |
| サポート | ||
| 88 | OpenSSL CCS Injection の脆弱性 (CVE-2014-0224) の影響と対処 | https://users.miraclelinux.com/support/?q=node/423 |
| サーバ・クライアント製品セキュリティ情報 | ||
| 89 | OpenSSLの脆弱性(CVE-2014-0224他)によるHA8500シリーズへの影響について | http://www.hitachi.co.jp/products/it/server/security/info/vulnerable/openssl_cve20140224_ha8500.html |
| 90 | OpenSSLの脆弱性(CVE-2014-0224他)によるテープライブラリ装置への影響について | http://www.hitachi.co.jp/products/it/server/security/info/vulnerable/openssl_cve20140224_tape_library.html |
| シスコ セキュリティアドバイザリ | ||
| 91 | cisco-sa-20140605-openssl | http://www.cisco.com/cisco/web/support/JP/112/1122/1122700_cisco-sa-20140605-openssl-j.html |
| ソフトウェア製品セキュリティ情報 | ||
| 92 | HS15-012 | http://www.hitachi.co.jp/Prod/comp/soft1/security/info/vuls/HS15-012/index.html |
| トレンドマイクロ Q&Aページ | ||
| 93 | アラート/アドバイザリ: OpenSSL の脆弱性 (CVE-2014-0224) について | http://esupport.trendmicro.com/solution/ja-jp/1103804.aspx |
| トレンドマイクロ サポート情報 | ||
| 94 | Trend Micro products and the CCS Injection Vulnerability - [CVE-2014-0224] OpenSSL Vulnerability | http://esupport.trendmicro.com/solution/en-US/1103813.aspx |
| 富士通 セキュリティ情報 | ||
| 95 | OpenSSL における Change Cipher Spec メッセージの処理に脆弱性 (CVE-2014-0224) | http://software.fujitsu.com/jp/security/vulnerabilities/jvn-61247051.html |
| 96 | Symantec Backup Exec 2012/ ETERNUS BE50: OpenSSL における Change Cipher Spec メッセージ処理の脆弱性 (CVE-2014-0224) | http://software.fujitsu.com/jp/security/products-fujitsu/solution/backup_exec201401.html |
| 97 | Symfoware Server: OpenSSLの脆弱性(CVE-2014-0224, CVE-2014-0221, CVE-2014-0195, CVE-2014-3470) | http://software.fujitsu.com/jp/security/products-fujitsu/solution/symfoware_201404.html |
| 98 | Systemwalker Centric Manager: OpenSSL における Change Cipher Spec メッセージの処理に脆弱性(JVNDB-2014-000048) | http://software.fujitsu.com/jp/security/products-fujitsu/solution/systemwalker_centric_mgr201401.html |
| 99 | Systemwalker Desktop Keeper, Systemwalker Desktop Patrol: OpenSSL の Change Cipher Spec メッセージの処理に脆弱性(CVE-2014-0224) | http://software.fujitsu.com/jp/security/products-fujitsu/solution/systemwalker_dtkp201402.html |
| 100 | Systemwalker Runbook Automation: OpenSSL における Change Cipher Spec メッセージの処理に脆弱性(CVE-2014-0224) | http://software.fujitsu.com/jp/security/products-fujitsu/solution/sw_rba201401.html |
| 101 | Systemwalker Service Quality Coordinator: OpenSSL における Change Cipher Spec メッセージの処理に脆弱性(CVE-2014-0224) | http://software.fujitsu.com/jp/security/products-fujitsu/solution/sw_sqc201401.html |
| 東芝テック | ||
| 102 | 複合機のセキュリティ対策について(更新) | http://www.toshibatec.co.jp/page.jsp?id=4152 |
| 製品セキュリティ情報 | ||
| 103 | OpenSSL における Change Cipher Spec メッセージの処理に脆弱性 (CVE-2014-0224) | http://buffalo.jp/support_s/s20141001_2.html |
| No | Name | URL |
|---|---|---|
| CERT-FI | ||
| 1 | Haavoittuvuuksia OpenSSL-kirjastossa | https://www.cert.fi/haavoittuvuudet/2014/haavoittuvuus-2014-075.html |
| ICS-CERT ADVISORY | ||
| 2 | ICSA-14-156-01 | http://ics-cert.us-cert.gov/advisories/ICSA-14-156-01 |
| 3 | ICSA-14-198-03 | https://ics-cert.us-cert.gov/advisories/ICSA-14-198-03 |
| IETF | ||
| 4 | Change Cipher Spec | http://tools.ietf.org/html/rfc5246#section-7.1 |
| IPA 重要なセキュリティ情報 | ||
| 5 | 「OpenSSL」における Change Cipher Spec メッセージ処理の脆弱性対策について(JVN#61247051) | http://www.ipa.go.jp/security/ciadr/vul/20140606-jvn.html |
| JVN | ||
| 6 | JVN#61247051 | http://jvn.jp/jp/JVN61247051/index.html |
| 7 | JVNVU#93868849 | http://jvn.jp/vu/JVNVU93868849/index.html |
| US-CERT Vulnerability Note | ||
| 8 | VU#978508 | http://www.kb.cert.org/vuls/id/978508 |
| 関連文書 | ||
| 9 | CCS Injection Vulnerability | http://ccsinjection.lepidum.co.jp/ja.html |
| 10 | CCS Injection脆弱性(CVE-2014-0224)発見の経緯についての紹介 | http://ccsinjection.lepidum.co.jp/blog/2014-06-05/CCS-Injection/index.html |
| 11 | Here is the timeline from my (OpenSSL) perspective for the recent CCS Injection (MITM) vulnerability as well as the other flaws being fixed today | https://plus.google.com/app/basic/stream/z12xhp3hbzbhhjgfm22ncvtbeua1dpaa004 |
| 12 | 株式会社アラタナ の告知ページ | http://www.aratana.jp/security/detail.php?id=9 |
| No | Changed Details | Date of change |
|---|---|---|
| 0 | [2014年06月06日] 掲載 [2014年06月09日] ベンダ情報:OpenSSL Project (Fix for CVE-2014-0224) を追加 ベンダ情報:ミラクル・リナックス (OpenSSL CCS Injection の脆弱性 (CVE-2014-0224) の影響と対処) を追加 ベンダ情報:ヤマハ (OpenSSL「Change Cipher Specメッセージ処理」の脆弱性について) を追加 ベンダ情報:富士通 (OpenSSL における Change Cipher Spec メッセージの処理に脆弱性 (CVE-2014-0224)) を追加 ベンダ情報:レッドハット (OpenSSL MITM CCS injection attack (CVE-2014-0224)) を追加 ベンダ情報:レッドハット (Bug 1103586) を追加 参考情報:National Vulnerability Database (NVD) (CVE-2014-0224) を追加 参考情報:ICS-CERT ADVISORY (ICSA-14-156-01) を追加 [2014年06月10日] ベンダ情報:トレンドマイクロ (アラート/アドバイザリ: OpenSSL の脆弱性 (CVE-2014-0224) について) を追加 [2014年06月11日] ベンダ情報:ミラクル・リナックス (openssl-1.0.1e-16.AXS4.14) を追加 ベンダ情報:ミラクル・リナックス (openssl098e-0.9.8e-18.AXS4.2) を追加 ベンダ情報:ミラクル・リナックス (openssl-0.9.8e-27.AXS3.3) を追加 ベンダ情報:ミラクル・リナックス (openssl097a-0.9.7a-12.AXS3.1) を追加 [2014年06月16日] ベンダ情報:横河電機株式会社 (横河電機株式会社からの情報) を追加 ベンダ情報:富士通 (Systemwalker Runbook Automation: OpenSSL における Change Cipher Spec メッセージの処理に脆弱性(CVE-2014-0224)) を追加 ベンダ情報:富士通 (Systemwalker Service Quality Coordinator: OpenSSL における Change Cipher Spec メッセージの処理に脆弱性(CVE-2014-0224)) を追加 [2014年06月23日] ベンダ情報:オラクル (CVE-2014-0224 Cryptographic Issues vulnerability in OpenSSL) を追加 ベンダ情報:オラクル (CVE-2014-0224 Cryptographic Issues vulnerability in WAN Boot) を追加 [2014年06月24日] ベンダ情報:日立 (HIRT-PUB14010) を追加 [2014年06月26日] ベンダ情報:ターボリナックス (TLSA-2014-3) を追加 [2014年06月27日] ベンダ情報:シスコシステムズ (cisco-sa-20140605-openssl) を追加 ベンダ情報:ブルーコートシステムズ (SA80) を追加 [2014年07月01日] ベンダ情報:VMware (2079783) を追加 ベンダ情報:VMware (VMSA-2014-0006) を追加 ベンダ情報:富士通 (Systemwalker Desktop Keeper, Systemwalker Desktop Patrol: OpenSSL の Change Cipher Spec メッセージの処理に脆弱性(CVE-2014-0224)) を追加 [2014年07月09日] ベンダ情報:富士通 (Systemwalker Centric Manager: OpenSSL における Change Cipher Spec メッセージの処理に脆弱性(JVNDB-2014-000048)) を追加 [2014年07月11日] ベンダ情報:Kerio Technologies (Kerio Control Release History) を追加 ベンダ情報:富士通 (Symantec Backup Exec 2012/ ETERNUS BE50: OpenSSL における Change Cipher Spec メッセージ処理の脆弱性 (CVE-2014-0224)) を追加 [2014年07月16日] ベンダ情報:富士通 (Symfoware Server: OpenSSLの脆弱性(CVE-2014-0224, CVE-2014-0221, CVE-2014-0195, CVE-2014-3470)) を追加 [2014年07月18日] ベンダ情報:オラクル (Oracle Critical Patch Update Advisory - July 2014) を追加 ベンダ情報:オラクル (Text Form of Oracle Critical Patch Update - July 2014 Risk Matrices) を追加 ベンダ情報:オラクル (July 2014 Critical Patch Update Released) を追加 参考情報:ICS-CERT ADVISORY (ICSA-14-198-03) を追加 [2014年08月05日] ベンダ情報:レッドハット (RHSA-2014:0624) を追加 ベンダ情報:レッドハット (RHSA-2014:0626) を追加 ベンダ情報:レッドハット (RHSA-2014:0627) を追加 ベンダ情報:レッドハット (RHSA-2014:0630) を追加 ベンダ情報:レッドハット (RHSA-2014:0631) を追加 ベンダ情報:レッドハット (RHSA-2014:0632) を追加 ベンダ情報:レッドハット (RHSA-2014:0633) を追加 ベンダ情報:レッドハット (RHSA-2014:0680) を追加 ベンダ情報:BlackBerry (KB36051) を追加 ベンダ情報:FileZilla (Version history) を追加 ベンダ情報:Huawei (Huawei-SA-20140613-OpenSSL) を追加 ベンダ情報:InterSect Alliance International Pty (Release Notes for Snare Enterprise Agent for MSSQL v1.2) を追加 ベンダ情報:InterSect Alliance International Pty (Release Notes for Snare Enterprise Agent for Windows v4.2) を追加 ベンダ情報:Novell (7015300) を追加 ベンダ情報:Novell (7015264) を追加 ベンダ情報:Splunk (Splunk Enterprise 6.1.2, 6.0.5 and 5.0.9 address two vulnerabilities - July 1, 2014) を追加 ベンダ情報:Tenable Network Security (Nessus 5.2.7 and PVS 4.0.3 Are Available for Download) を追加 ベンダ情報:Tenable Network Security (Nessus 5.2.7 Now Available) を追加 ベンダ情報:オラクル (Changes in MySQL Workbench 6.1.7 (2014-06-27)) を追加 ベンダ情報:トレンドマイクロ (Trend Micro products and the CCS Injection Vulnerability - [CVE-2014-0224] OpenSSL Vulnerability) を追加 ベンダ情報:ヒューレット・パッカード (HPSBMU03053 SSRT101613) を追加 ベンダ情報:ヒューレット・パッカード (HPSBMU03058 SSRT101591) を追加 ベンダ情報:ヒューレット・パッカード (HPSBMU03070 SSRT101637) を追加 ベンダ情報:マカフィー (SB10075) を追加 ベンダ情報:IBM (00001841) を追加 ベンダ情報:IBM (00001843) を追加 ベンダ情報:IBM (N1020172) を追加 ベンダ情報:IBM (S1004690) を追加 ベンダ情報:IBM (1673137) を追加 ベンダ情報:IBM (1676035) を追加 ベンダ情報:IBM (1676062) を追加 ベンダ情報:IBM (1676419) を追加 ベンダ情報:IBM (1676496) を追加 ベンダ情報:IBM (1676655) を追加 ベンダ情報:IBM (1676845) を追加 ベンダ情報:IBM (1677390) を追加 ベンダ情報:IBM (1677567) を追加 ベンダ情報:IBM (1677695) を追加 ベンダ情報:IBM (1677828) を追加 ベンダ情報:IBM (1678167) を追加 ベンダ情報:IBM (1678289) を追加 ベンダ情報:IBM (4037761) を追加 ベンダ情報:IBM (IBM Flex System Integrated Management Module II (IMM2) is affected by the following OpenSSL vulnerability: CVE-2014-0224) を追加 ベンダ情報:IBM (IBM System Networking switches that are affected by the OpenSSL vulnerability: CVE-2014-0224) を追加 ベンダ情報:IBM (Announcing PTF MH01439 for HMC Version 7 Release 7.7.0 Service Pack 3) を追加 ベンダ情報:IBM (Announcing PTF MH01438 for HMC Version 7 Release 7.6.0 Service Pack 3) を追加 ベンダ情報:フォーティネット (Multiple Vulnerabilities in OpenSSL) を追加 [2014年08月18日] ベンダ情報:Puppet Labs (CVE-2014-0224) を追加 [2014年09月10日] ベンダ情報:オラクル (ELSA-2014-1053) を追加 [2014年09月24日] ベンダ情報:アップル (HT6443) を追加 参考情報:JVN (JVNVU#93868849) を追加 [2014年10月06日] ベンダ情報:バッファロー (OpenSSL における Change Cipher Spec メッセージの処理に脆弱性 (CVE-2014-0224)) を追加 [2014年10月21日] ベンダ情報:オラクル (Oracle Critical Patch Update Advisory - October 2014) を追加 ベンダ情報:オラクル (Text Form of Oracle Critical Patch Update - October 2014 Risk Matrices) を追加 ベンダ情報:オラクル (October 2014 Critical Patch Update Released) を追加 [2015年01月22日] ベンダ情報:オラクル (Oracle Critical Patch Update Advisory - January 2015) を追加 ベンダ情報:オラクル (Text Form of Oracle Critical Patch Update - January 2015 Risk Matrices) を追加 ベンダ情報:オラクル (January 2015 Critical Patch Update Released) を追加 [2015年04月22日] ベンダ情報:日立 (HS15-012) を追加 [2015年06月26日] ベンダ情報:ヒューレット・パッカード (HPSBST03195) を追加 ベンダ情報:ヒューレット・パッカード (HPSBST03265) を追加 ベンダ情報:ヒューレット・パッカード (HPSBMU03216) を追加 [2015年10月28日] ベンダ情報:日本電気 (NV15-011) を追加 [2015年12月17日] ベンダ情報:日立 (OpenSSLの脆弱性(CVE-2014-0224他)によるHA8500シリーズへの影響について) を追加 ベンダ情報:日立 (OpenSSLの脆弱性(CVE-2014-0224他)によるテープライブラリ装置への影響について)による影響について) を追加 [2016年07月27日] ベンダ情報:オラクル (Oracle Critical Patch Update Advisory - July 2016) を追加 ベンダ情報:オラクル (Text Form of Oracle Critical Patch Update - July 2016 Risk Matrices) を追加 ベンダ情報:オラクル (July 2016 Critical Patch Update Released) を追加 [2016年11月22日] ベンダ情報:オラクル (Oracle Critical Patch Update Advisory - October 2016) を追加 ベンダ情報:オラクル (Text Form of Oracle Critical Patch Update - October 2016 Risk Matrices) を追加 ベンダ情報:オラクル (October 2016 Critical Patch Update Released) を追加 |
Feb. 17, 2018, 10:37 a.m. |