The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before 1.0.1g do not properly handle Heartbeat Extension packets, which allows remote attackers to obtain sensitive information from process memory via crafted packets that trigger a buffer over-read, as demonstrated by reading private keys, related to d1_both.c and t1_lib.c, aka the Heartbleed bug.
Metrics
Affected Vendors & Products
References
History
Fri, 07 Feb 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
kev
|
Tue, 13 Aug 2024 23:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|

Status: PUBLISHED
Assigner: redhat
Published: 2014-04-07T00:00:00.000Z
Updated: 2025-02-07T13:32:37.531Z
Reserved: 2013-12-03T00:00:00.000Z
Link: CVE-2014-0160

Updated: 2024-08-06T09:05:39.056Z

Status : Modified
Published: 2014-04-07T22:55:03.893
Modified: 2025-02-07T14:15:35.913
Link: CVE-2014-0160
