Professional OVAL Repository
[Eng]
[Rus]
[Sign-In]
OVAL
Search
Categories
RedCheck
About
OVAL Definitions
OVAL Items
FSTEC Data Bank Information Security Threats
NKCKI
EOL (End Of Life)
Linux Security Advisories
Mozilla Foundation Security Advisory
IBM
VMware
Cisco
Check Point Software Technologies
Apache
Solaris
FreeBSD
Development
GitHub Enterprise
Google Chrome Security Advisories
Oracle Security Advisories
Adobe Security Advisories
OpenSSL Security Advisories
Microsoft
CVE
CWE
CPE
Latest Updates
OS ROSA
ALT Linux
Astra Linux SE 1.5
Astra Linux SE 1.6
RED OS
DSA (Debian Security Advisory) Patсh Statistics
DSA (Debian Security Advisory) Patсh Feed
DSA (Debian Security Advisory) Vulnerability Feed
DLA (Debian Security Advisory) Patсh Statistics
DLA (Debian Security Advisory) Patсh Feed
DLA (Debian Security Advisory) Vulnerability Feed
ALT Linux (Security Bulletins) Patсh Statistics
ALT Linux (Security Bulletins) Patсh Feed
ALT Linux (Security Bulletins) Vulnerability Feed
RED OS (Security Bulletins) Patсh Statistics
RED OS (Security Bulletins) Patсh Feed
RED OS (Security Bulletins) Vulnerability Feed
USN (Ubuntu Security Notice) Patсh Statistics
USN (Ubuntu Security Notice) Patсh Feed
USN (Ubuntu Security Notice) Vulnerability Feed
RHSA (RedHat Security Advisory) Patсh Statistics
RHSA (RedHat Security Advisory) Patсh Feed
RHSA (RedHat Security Advisory) Vulnerability Feed
ELSA (Oracle Linux Security Advisory) Patсh Statistics
ELSA (Oracle Linux Security Advisory) Patсh Feed
ELSA (Oracle Linux Security Advisory) Vulnerability Feed
SUSE (SUSE Security Advisories) Patсh Statistics
SUSE (SUSE Security Advisories) Patсh Feed
SUSE (SUSE Security Advisories) Vulnerability Feed
openSUSE (openSUSE Security Advisories) Patсh Statistics
openSUSE (openSUSE Security Advisories) Patсh Feed
openSUSE (openSUSE Security Advisories) Vulnerability Feed
Amazon Linux AMI (Security Bulletins) Patсh Statistics
Amazon Linux AMI (Security Bulletins) Patсh Feed
Amazon Linux AMI (Security Bulletins) Vulnerability Feed
Mageia Linux (Security Bulletins) Patсh Statistics
Mageia Linux (Security Bulletins) Patсh Feed
Mageia Linux (Security Bulletins) Vulnerability Feed
OS ROSA SX COBALT 1.0
OS ROSA DX COBALT 1.0
ROSA 7.3 (Security Advisories) Patсh Statistics
ROSA 7.3 (Security Advisories) Patсh Feed
ROSA 7.3 (Security Advisories) Vulnerability Feed
ALT Linux SPT 6.0
ALT Linux SPT 7.0
ALT 8 SP
ALT 9
RED OS Murom 7.1
RED OS Murom 7.2
IBM DB2
VMware Vulnerabilities Advisory (VMSA)
VMware vCenter Patch Advisories
VMware ESXi Patch Advisories
VMware NSX Patches
VMware NSX Vulnerabilities
VMware Photon OS 1.0 Patches
VMware Photon OS 1.0 Vulnerabilities
VMware Photon OS 2.0 Patches
VMware Photon OS 2.0 Vulnerabilities
Cisco ASA
Cisco IOS/NX-OS Advisory
Cisco NX-OS Vulnerabilities
Check Point Gaia
Apache Tomcat Advisories
Apache Tomcat Server
Apache HTTP Server
Python
Node.js
RubyGems
Qt
Microsoft Security Bulletin
Microsoft Knowledge Base Article
Microsoft SharePoint
Microsoft SharePoint Foundation 2013
Microsoft SharePoint Server 2013
Microsoft SharePoint Server 2016
About OVALdb
User manual
Pricing
Contact us
OVAL Definitions
>
OVAL Definition Details
Id
oval:ru.altx-soft.nix:def:8130
[Eng]
Version
12
Class
patch
ALTXid
74608
Language
Russian
Severity
High
Title
Обновление SUSE-SU-2015:0743-1 -- устранение уязвимостей в mariadb
Description
mariadb was updated to version 10.0.16 to fix 40 security issues.
Family
unix
Platform
SUSE Linux Enterprise Desktop 12
SUSE Linux Enterprise Server 12
Product
mariadb
Reference
VENDOR: SUSE-SU-2015:0743-1
VENDOR: SUSE-SU-2015:0743-1
Id:
SUSE-SU-2015:0743-1
Reference:
https://www.suse.com/support/update/announcement/2015/suse-su-20150743-1.html
CVE: CVE-2015-0411
CVE: CVE-2015-0411
Id:
CVE-2015-0411
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0411
Comment
: Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier, and 5.6.21 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Server : Security : Encryption.
CVSSv2 Score:
7.5
Access vector:
NETWORK
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
PARTIAL
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P
References:
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html (CONFIRM)
62732 (SECUNIA)
62730 (SECUNIA)
62728 (SECUNIA)
1031581 (SECTRACK)
FEDORA-2015-1162 (FEDORA)
USN-2480-1 (UBUNTU)
DSA-3135 (DEBIAN)
RHSA-2015:0116 (REDHAT)
RHSA-2015:0117 (REDHAT)
RHSA-2015:0118 (REDHAT)
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html (CONFIRM)
http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html (CONFIRM)
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html (CONFIRM)
GLSA-201504-05 (GENTOO)
RHSA-2015:1628 (REDHAT)
72191 (BID)
SUSE-SU-2015:0743 (SUSE)
oracle-cpujan2015-cve20150411(100183) (XF)
CVE: CVE-2015-0382
CVE: CVE-2015-0382
Id:
CVE-2015-0382
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0382
Comment
: Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier and 5.6.21 and earlier allows remote attackers to affect availability via unknown vectors related to Server : Replication, a different vulnerability than CVE-2015-0381.
CVSSv2 Score:
4.3
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:N/I:N/A:P
References:
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html (CONFIRM)
72200 (BID)
62732 (SECUNIA)
62730 (SECUNIA)
62728 (SECUNIA)
1031581 (SECTRACK)
FEDORA-2015-1162 (FEDORA)
USN-2480-1 (UBUNTU)
DSA-3135 (DEBIAN)
RHSA-2015:0116 (REDHAT)
RHSA-2015:0117 (REDHAT)
RHSA-2015:0118 (REDHAT)
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html (CONFIRM)
http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html (CONFIRM)
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html (CONFIRM)
GLSA-201504-05 (GENTOO)
RHSA-2015:1628 (REDHAT)
SUSE-SU-2015:0743 (SUSE)
oracle-cpujan2015-cve20150382(100184) (XF)
CVE: CVE-2015-0381
CVE: CVE-2015-0381
Id:
CVE-2015-0381
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0381
Comment
: Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier and 5.6.21 and earlier allows remote attackers to affect availability via unknown vectors related to Server : Replication, a different vulnerability than CVE-2015-0382.
CVSSv2 Score:
4.3
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:N/I:N/A:P
References:
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html (CONFIRM)
72214 (BID)
62732 (SECUNIA)
62730 (SECUNIA)
62728 (SECUNIA)
1031581 (SECTRACK)
FEDORA-2015-1162 (FEDORA)
USN-2480-1 (UBUNTU)
DSA-3135 (DEBIAN)
RHSA-2015:0116 (REDHAT)
RHSA-2015:0117 (REDHAT)
RHSA-2015:0118 (REDHAT)
http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html (CONFIRM)
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html (CONFIRM)
GLSA-201504-05 (GENTOO)
RHSA-2015:1628 (REDHAT)
SUSE-SU-2015:0743 (SUSE)
oracle-cpujan2015-cve20150381(100185) (XF)
CVE: CVE-2015-0432
CVE: CVE-2015-0432
Id:
CVE-2015-0432
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0432
Comment
: Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier allows remote authenticated users to affect availability via vectors related to Server : InnoDB : DDL : Foreign Key.
CVSSv2 Score:
4
Access vector:
NETWORK
Access complexity:
LOW
Authentication:
SINGLE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:L/Au:S/C:N/I:N/A:P
References:
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html (CONFIRM)
62732 (SECUNIA)
62730 (SECUNIA)
62728 (SECUNIA)
1031581 (SECTRACK)
FEDORA-2015-1162 (FEDORA)
USN-2480-1 (UBUNTU)
DSA-3135 (DEBIAN)
RHSA-2015:0116 (REDHAT)
RHSA-2015:0117 (REDHAT)
RHSA-2015:0118 (REDHAT)
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html (CONFIRM)
http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html (CONFIRM)
GLSA-201504-05 (GENTOO)
RHSA-2015:1628 (REDHAT)
72217 (BID)
SUSE-SU-2015:0743 (SUSE)
oracle-cpujan2015-cve20150432(100187) (XF)
CVE: CVE-2014-6568
CVE: CVE-2014-6568
Id:
CVE-2014-6568
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6568
Comment
: Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier, and 5.6.21 and earlier, allows remote authenticated users to affect availability via vectors related to Server : InnoDB : DML.
CVSSv2 Score:
3.5
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
SINGLE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:M/Au:S/C:N/I:N/A:P
References:
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html (CONFIRM)
72210 (BID)
62732 (SECUNIA)
62730 (SECUNIA)
62728 (SECUNIA)
1031581 (SECTRACK)
FEDORA-2015-1162 (FEDORA)
USN-2480-1 (UBUNTU)
DSA-3135 (DEBIAN)
RHSA-2015:0116 (REDHAT)
RHSA-2015:0117 (REDHAT)
RHSA-2015:0118 (REDHAT)
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html (CONFIRM)
http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html (CONFIRM)
GLSA-201504-05 (GENTOO)
RHSA-2015:1628 (REDHAT)
SUSE-SU-2015:0743 (SUSE)
CVE: CVE-2015-0374
CVE: CVE-2015-0374
Id:
CVE-2015-0374
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0374
Comment
: Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier and 5.6.21 and earlier allows remote authenticated users to affect confidentiality via unknown vectors related to Server : Security : Privileges : Foreign Key.
CVSSv2 Score:
3.5
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
SINGLE
Confidentiality impact:
PARTIAL
Integrity impact:
NONE
Availability impact:
NONE
CVSSv2 Vector:
AV:N/AC:M/Au:S/C:P/I:N/A:N
References:
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html (CONFIRM)
72227 (BID)
62732 (SECUNIA)
62730 (SECUNIA)
62728 (SECUNIA)
1031581 (SECTRACK)
FEDORA-2015-1162 (FEDORA)
USN-2480-1 (UBUNTU)
DSA-3135 (DEBIAN)
RHSA-2015:0116 (REDHAT)
RHSA-2015:0117 (REDHAT)
RHSA-2015:0118 (REDHAT)
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html (CONFIRM)
http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html (CONFIRM)
GLSA-201504-05 (GENTOO)
RHSA-2015:1628 (REDHAT)
SUSE-SU-2015:0743 (SUSE)
oracle-cpujan2015-cve20150374(100191) (XF)
CVE: CVE-2014-6507
CVE: CVE-2014-6507
Id:
CVE-2014-6507
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6507
Comment
: Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier, and 5.6.20 and earlier, allows remote authenticated users to affect confidentiality, integrity, and availability via vectors related to SERVER:DML.
CVSSv2 Score:
4.3
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:N/I:N/A:P
References:
http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html (CONFIRM)
61579 (SECUNIA)
70550 (BID)
GLSA-201411-02 (GENTOO)
62073 (SECUNIA)
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html (CONFIRM)
http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html (CONFIRM)
SUSE-SU-2015:0743 (SUSE)
CVE: CVE-2014-6491
CVE: CVE-2014-6491
Id:
CVE-2014-6491
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6491
Comment
: Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier and 5.6.20 and earlier allows remote attackers to affect confidentiality, integrity, and availability via vectors related to SERVER:SSL:yaSSL, a different vulnerability than CVE-2014-6500.
CVSSv2 Score:
7.5
Access vector:
NETWORK
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
PARTIAL
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P
References:
http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html (CONFIRM)
61579 (SECUNIA)
70444 (BID)
GLSA-201411-02 (GENTOO)
62073 (SECUNIA)
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698 (CONFIRM)
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html (CONFIRM)
http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html (CONFIRM)
SUSE-SU-2015:0743 (SUSE)
CVE: CVE-2014-6500
CVE: CVE-2014-6500
Id:
CVE-2014-6500
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6500
Comment
: Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier, and 5.6.20 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to SERVER:SSL:yaSSL, a different vulnerability than CVE-2014-6491.
CVSSv2 Score:
7.5
Access vector:
NETWORK
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
PARTIAL
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P
References:
http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html (CONFIRM)
61579 (SECUNIA)
70478 (BID)
GLSA-201411-02 (GENTOO)
62073 (SECUNIA)
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698 (CONFIRM)
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html (CONFIRM)
http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html (CONFIRM)
SUSE-SU-2015:0743 (SUSE)
CVE: CVE-2014-6469
CVE: CVE-2014-6469
Id:
CVE-2014-6469
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6469
Comment
: Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier and 5.6.20 and earlier allows remote authenticated users to affect availability via vectors related to SERVER:OPTIMIZER.
CVSSv2 Score:
6.8
Access vector:
NETWORK
Access complexity:
LOW
Authentication:
SINGLE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:N/AC:L/Au:S/C:N/I:N/A:C
References:
http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html (CONFIRM)
61579 (SECUNIA)
70446 (BID)
GLSA-201411-02 (GENTOO)
62073 (SECUNIA)
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html (CONFIRM)
http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html (CONFIRM)
SUSE-SU-2015:0743 (SUSE)
CVE: CVE-2014-6555
CVE: CVE-2014-6555
Id:
CVE-2014-6555
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6555
Comment
: Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier and 5.6.20 and earlier allows remote authenticated users to affect confidentiality, integrity, and availability via vectors related to SERVER:DML.
CVSSv2 Score:
6.5
Access vector:
NETWORK
Access complexity:
LOW
Authentication:
SINGLE
Confidentiality impact:
PARTIAL
Integrity impact:
PARTIAL
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:L/Au:S/C:P/I:P/A:P
References:
http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html (CONFIRM)
70530 (BID)
61579 (SECUNIA)
GLSA-201411-02 (GENTOO)
62073 (SECUNIA)
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html (CONFIRM)
http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html (CONFIRM)
SUSE-SU-2015:0743 (SUSE)
CVE: CVE-2014-6559
CVE: CVE-2014-6559
Id:
CVE-2014-6559
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6559
Comment
: Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier, and 5.6.20 and earlier, allows remote attackers to affect confidentiality via vectors related to C API SSL CERTIFICATE HANDLING.
CVSSv2 Score:
4.3
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
NONE
Availability impact:
NONE
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:P/I:N/A:N
References:
http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html (CONFIRM)
61579 (SECUNIA)
70487 (BID)
GLSA-201411-02 (GENTOO)
62073 (SECUNIA)
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698 (CONFIRM)
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html (CONFIRM)
http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html (CONFIRM)
SUSE-SU-2015:0743 (SUSE)
CVE: CVE-2014-6494
CVE: CVE-2014-6494
Id:
CVE-2014-6494
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6494
Comment
: Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier, and 5.6.20 and earlier, allows remote attackers to affect availability via vectors related to CLIENT:SSL:yaSSL, a different vulnerability than CVE-2014-6496.
CVSSv2 Score:
4.3
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:N/I:N/A:P
References:
http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html (CONFIRM)
70497 (BID)
61579 (SECUNIA)
GLSA-201411-02 (GENTOO)
62073 (SECUNIA)
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698 (CONFIRM)
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html (CONFIRM)
http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html (CONFIRM)
SUSE-SU-2015:0743 (SUSE)
CVE: CVE-2014-6496
CVE: CVE-2014-6496
Id:
CVE-2014-6496
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6496
Comment
: Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier, and 5.6.20 and earlier, allows remote attackers to affect availability via vectors related to CLIENT:SSL:yaSSL, a different vulnerability than CVE-2014-6494.
CVSSv2 Score:
4.3
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:N/I:N/A:P
References:
http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html (CONFIRM)
70469 (BID)
61579 (SECUNIA)
GLSA-201411-02 (GENTOO)
62073 (SECUNIA)
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698 (CONFIRM)
http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html (CONFIRM)
SUSE-SU-2015:0743 (SUSE)
CVE: CVE-2014-6464
CVE: CVE-2014-6464
Id:
CVE-2014-6464
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6464
Comment
: Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier and 5.6.20 and earlier allows remote authenticated users to affect availability via vectors related to SERVER:INNODB DML FOREIGN KEYS.
CVSSv2 Score:
4
Access vector:
NETWORK
Access complexity:
LOW
Authentication:
SINGLE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:L/Au:S/C:N/I:N/A:P
References:
http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html (CONFIRM)
61579 (SECUNIA)
70451 (BID)
GLSA-201411-02 (GENTOO)
62073 (SECUNIA)
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html (CONFIRM)
http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html (CONFIRM)
SUSE-SU-2015:0743 (SUSE)
CVE: CVE-2010-5298
CVE: CVE-2010-5298
Id:
CVE-2010-5298
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-5298
Comment
: Race condition in the ssl3_read_bytes function in s3_pkt.c in OpenSSL through 1.0.1g, when SSL_MODE_RELEASE_BUFFERS is enabled, allows remote attackers to inject data across sessions or cause a denial of service (use-after-free and parsing error) via an SSL connection in a multithreaded environment.
CVSSv2 Score:
4
Access vector:
NETWORK
Access complexity:
HIGH
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
PARTIAL
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:H/Au:N/C:N/I:P/A:P
CWE:
362 (Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition'))
References:
[oss-security] 20140412 Use-after-free race condition,in OpenSSL's read buffer (MLIST)
http://svnweb.freebsd.org/ports/head/security/openssl/files/patch-ssl-s3_pkt.c?revision=351191&view=markup (CONFIRM)
http://ftp.openbsd.org/pub/OpenBSD/patches/5.5/common/004_openssl.patch.sig (CONFIRM)
http://www.tedunangst.com/flak/post/analysis-of-openssl-freelist-reuse (MISC)
https://rt.openssl.org/Ticket/Display.html?id=3265&user=guest&pass=guest (MISC)
[5.5] 004: SECURITY FIX: April 12, 2014 (OPENBSD)
https://rt.openssl.org/Ticket/Display.html?id=2167&user=guest&pass=guest (MISC)
66801 (BID)
http://www.openssl.org/news/secadv_20140605.txt (CONFIRM)
https://kb.bluecoat.com/index?page=content&id=SA80 (CONFIRM)
20140605 Multiple Vulnerabilities in OpenSSL Affecting Cisco Products (CISCO)
http://www.blackberry.com/btsc/KB36051 (CONFIRM)
http://www-01.ibm.com/support/docview.wss?uid=swg21676035 (CONFIRM)
59438 (SECUNIA)
59301 (SECUNIA)
59450 (SECUNIA)
59721 (SECUNIA)
http://www-01.ibm.com/support/docview.wss?uid=swg21677695 (CONFIRM)
59655 (SECUNIA)
http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-345106.htm (CONFIRM)
59162 (SECUNIA)
http://www-01.ibm.com/support/docview.wss?uid=swg21676655 (CONFIRM)
58939 (SECUNIA)
59666 (SECUNIA)
http://www-01.ibm.com/support/docview.wss?uid=swg21677828 (CONFIRM)
59490 (SECUNIA)
http://www-01.ibm.com/support/docview.wss?uid=swg21676062 (CONFIRM)
https://kc.mcafee.com/corporate/index?page=content&id=SB10075 (CONFIRM)
http://www-01.ibm.com/support/docview.wss?uid=swg21676419 (CONFIRM)
http://www-01.ibm.com/support/docview.wss?uid=swg21678167 (CONFIRM)
http://www-01.ibm.com/support/docview.wss?uid=swg21673137 (CONFIRM)
http://www-01.ibm.com/support/docview.wss?uid=swg21677527 (CONFIRM)
59669 (SECUNIA)
59413 (SECUNIA)
59300 (SECUNIA)
http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html (CONFIRM)
http://www.fortiguard.com/advisory/FG-IR-14-018/ (CONFIRM)
59342 (SECUNIA)
http://www.vmware.com/security/advisories/VMSA-2014-0012.html (CONFIRM)
20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities (FULLDISC)
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html (CONFIRM)
MDVSA-2015:062 (MANDRIVA)
HPSBMU03055 (HP)
HPSBHF03052 (HP)
HPSBMU03051 (HP)
HPSBMU03074 (HP)
HPSBGN03068 (HP)
HPSBMU03057 (HP)
HPSBMU03076 (HP)
HPSBMU03056 (HP)
HPSBMU03062 (HP)
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05301946 (CONFIRM)
SUSE-SU-2015:0743 (SUSE)
https://www.novell.com/support/kb/doc.php?id=7015271 (CONFIRM)
http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095757 (CONFIRM)
http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095756 (CONFIRM)
http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095755 (CONFIRM)
http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095754 (CONFIRM)
http://www-01.ibm.com/support/docview.wss?uid=swg21683332 (CONFIRM)
http://www-01.ibm.com/support/docview.wss?uid=swg21677836 (CONFIRM)
http://www-01.ibm.com/support/docview.wss?uid=swg21676889 (CONFIRM)
http://www-01.ibm.com/support/docview.wss?uid=swg21676879 (CONFIRM)
http://www-01.ibm.com/support/docview.wss?uid=swg21676529 (CONFIRM)
http://www.vmware.com/security/advisories/VMSA-2014-0006.html (CONFIRM)
MDVSA-2014:090 (MANDRIVA)
http://www.ibm.com/support/docview.wss?uid=swg24037783 (CONFIRM)
http://www.ibm.com/support/docview.wss?uid=swg21676356 (CONFIRM)
http://support.citrix.com/article/CTX140876 (CONFIRM)
GLSA-201407-05 (GENTOO)
59440 (SECUNIA)
59437 (SECUNIA)
59287 (SECUNIA)
58977 (SECUNIA)
58713 (SECUNIA)
58337 (SECUNIA)
FEDORA-2014-9308 (FEDORA)
FEDORA-2014-9301 (FEDORA)
http://kb.juniper.net/InfoCenter/index?page=content&id=KB29195 (CONFIRM)
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10629 (CONFIRM)
http://advisories.mageia.org/MGASA-2014-0187.html (CONFIRM)
http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html (CONFIRM)
20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities (BUGTRAQ)
CVE: CVE-2014-0195
CVE: CVE-2014-0195
Id:
CVE-2014-0195
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0195
Comment
: The dtls1_reassemble_fragment function in d1_both.c in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly validate fragment lengths in DTLS ClientHello messages, which allows remote attackers to execute arbitrary code or cause a denial of service (buffer overflow and application crash) via a long non-initial fragment.
CVSSv2 Score:
6.8
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
PARTIAL
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:P
CWE:
120 (Buffer Copy without Checking Size of Input ('Classic Buffer Overflow'))
References:
http://h30499.www3.hp.com/t5/HP-Security-Research-Blog/Once-Bled-Twice-Shy-OpenSSL-CVE-2014-0195/ba-p/6501048 (MISC)
https://bugzilla.redhat.com/show_bug.cgi?id=1103598 (CONFIRM)
http://h30499.www3.hp.com/t5/HP-Security-Research-Blog/ZDI-14-173-CVE-2014-0195-OpenSSL-DTLS-Fragment-Out-of-Bounds/ba-p/6501002 (MISC)
http://www.openssl.org/news/secadv_20140605.txt (CONFIRM)
https://kb.bluecoat.com/index?page=content&id=SA80 (CONFIRM)
20140605 Multiple Vulnerabilities in OpenSSL Affecting Cisco Products (CISCO)
http://www.blackberry.com/btsc/KB36051 (CONFIRM)
http://www-01.ibm.com/support/docview.wss?uid=swg21676035 (CONFIRM)
59301 (SECUNIA)
59450 (SECUNIA)
59491 (SECUNIA)
59721 (SECUNIA)
http://www-01.ibm.com/support/docview.wss?uid=swg21677695 (CONFIRM)
59655 (SECUNIA)
59659 (SECUNIA)
http://www-01.ibm.com/support/docview.wss?uid=swg21678289 (CONFIRM)
59162 (SECUNIA)
59528 (SECUNIA)
58939 (SECUNIA)
59666 (SECUNIA)
59587 (SECUNIA)
59126 (SECUNIA)
http://support.f5.com/kb/en-us/solutions/public/15000/300/sol15356.html (CONFIRM)
http://www-01.ibm.com/support/docview.wss?uid=swg21677828 (CONFIRM)
59490 (SECUNIA)
http://www-01.ibm.com/support/docview.wss?uid=swg21676062 (CONFIRM)
https://kc.mcafee.com/corporate/index?page=content&id=SB10075 (CONFIRM)
http://www-01.ibm.com/support/docview.wss?uid=swg21676419 (CONFIRM)
http://www-01.ibm.com/support/docview.wss?uid=swg21678167 (CONFIRM)
http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-345106.htm (CONFIRM)
http://www-01.ibm.com/support/docview.wss?uid=swg21673137 (CONFIRM)
59514 (SECUNIA)
http://www-01.ibm.com/support/docview.wss?uid=swg21677527 (CONFIRM)
59669 (SECUNIA)
59413 (SECUNIA)
58883 (SECUNIA)
59300 (SECUNIA)
59895 (SECUNIA)
http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html (CONFIRM)
59530 (SECUNIA)
http://www.fortiguard.com/advisory/FG-IR-14-018/ (CONFIRM)
59342 (SECUNIA)
59451 (SECUNIA)
http://www-01.ibm.com/support/docview.wss?uid=isg400001843 (CONFIRM)
58743 (SECUNIA)
http://www-01.ibm.com/support/docview.wss?uid=isg400001841 (CONFIRM)
59990 (SECUNIA)
60571 (SECUNIA)
59784 (SECUNIA)
http://support.apple.com/kb/HT6443 (CONFIRM)
20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities (FULLDISC)
http://www.vmware.com/security/advisories/VMSA-2014-0012.html (CONFIRM)
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html (CONFIRM)
SSRT101846 (HP)
MDVSA-2015:062 (MANDRIVA)
HPSBMU03055 (HP)
HPSBMU03069 (HP)
HPSBUX03046 (HP)
HPSBMU03051 (HP)
HPSBMU03065 (HP)
HPSBMU03074 (HP)
HPSBGN03050 (HP)
HPSBMU03057 (HP)
HPSBOV03047 (HP)
HPSBMU03076 (HP)
HPSBMU03056 (HP)
HPSBMU03062 (HP)
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05301946 (CONFIRM)
openSUSE-SU-2016:0640 (SUSE)
SUSE-SU-2015:0743 (SUSE)
https://www.novell.com/support/kb/doc.php?id=7015271 (CONFIRM)
http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095757 (CONFIRM)
http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095756 (CONFIRM)
http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095755 (CONFIRM)
http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095754 (CONFIRM)
http://www-01.ibm.com/support/docview.wss?uid=swg21683332 (CONFIRM)
http://www-01.ibm.com/support/docview.wss?uid=swg21676889 (CONFIRM)
http://www-01.ibm.com/support/docview.wss?uid=swg21676879 (CONFIRM)
http://www-01.ibm.com/support/docview.wss?uid=swg21676644 (CONFIRM)
http://www-01.ibm.com/support/docview.wss?uid=swg21676071 (CONFIRM)
http://www-01.ibm.com/support/docview.wss?uid=swg21675821 (CONFIRM)
http://www-01.ibm.com/support/docview.wss?uid=nas8N1020163 (CONFIRM)
http://www.vmware.com/security/advisories/VMSA-2014-0006.html (CONFIRM)
1030337 (SECTRACK)
67900 (BID)
MDVSA-2014:106 (MANDRIVA)
http://www.ibm.com/support/docview.wss?uid=swg24037783 (CONFIRM)
http://www.ibm.com/support/docview.wss?uid=swg21676793 (CONFIRM)
http://www.ibm.com/support/docview.wss?uid=swg21676356 (CONFIRM)
http://www.f-secure.com/en/web/labs_global/fsc-2014-6 (CONFIRM)
http://support.citrix.com/article/CTX140876 (CONFIRM)
GLSA-201407-05 (GENTOO)
61254 (SECUNIA)
59518 (SECUNIA)
59454 (SECUNIA)
59449 (SECUNIA)
59441 (SECUNIA)
59437 (SECUNIA)
59429 (SECUNIA)
59365 (SECUNIA)
59364 (SECUNIA)
59310 (SECUNIA)
59306 (SECUNIA)
59305 (SECUNIA)
59287 (SECUNIA)
59223 (SECUNIA)
59192 (SECUNIA)
59189 (SECUNIA)
59188 (SECUNIA)
59175 (SECUNIA)
59040 (SECUNIA)
58977 (SECUNIA)
58945 (SECUNIA)
58714 (SECUNIA)
58713 (SECUNIA)
58660 (SECUNIA)
58615 (SECUNIA)
58337 (SECUNIA)
FEDORA-2014-9308 (FEDORA)
FEDORA-2014-9301 (FEDORA)
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10629 (CONFIRM)
http://aix.software.ibm.com/aix/efixes/security/openssl_advisory9.asc (CONFIRM)
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html (CONFIRM)
http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html (CONFIRM)
20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities (BUGTRAQ)
https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=1632ef744872edc2aa2a53d487d3e79c965a4ad3 ()
CVE: CVE-2014-0198
CVE: CVE-2014-0198
Id:
CVE-2014-0198
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0198
Comment
: The do_ssl3_write function in s3_pkt.c in OpenSSL 1.x through 1.0.1g, when SSL_MODE_RELEASE_BUFFERS is enabled, does not properly manage a buffer pointer during certain recursive calls, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via vectors that trigger an alert condition.
CVSSv2 Score:
4.3
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:N/I:N/A:P
CWE:
476 (NULL Pointer Dereference)
References:
https://bugzilla.redhat.com/show_bug.cgi?id=1093837 (CONFIRM)
[5.5] 005: RELIABILITY FIX: May 1, 2014 (OPENBSD)
https://rt.openssl.org/Ticket/Display.html?user=guest&pass=guest&id=3321 (CONFIRM)
openSUSE-SU-2014:0634 (SUSE)
DSA-2931 (DEBIAN)
openSUSE-SU-2014:0635 (SUSE)
http://www.openssl.org/news/secadv_20140605.txt (CONFIRM)
https://kb.bluecoat.com/index?page=content&id=SA80 (CONFIRM)
20140605 Multiple Vulnerabilities in OpenSSL Affecting Cisco Products (CISCO)
http://www.blackberry.com/btsc/KB36051 (CONFIRM)
http://www-01.ibm.com/support/docview.wss?uid=swg21676035 (CONFIRM)
59438 (SECUNIA)
59301 (SECUNIA)
59450 (SECUNIA)
59491 (SECUNIA)
59721 (SECUNIA)
http://www-01.ibm.com/support/docview.wss?uid=swg21677695 (CONFIRM)
59655 (SECUNIA)
http://www-01.ibm.com/support/docview.wss?uid=swg21676655 (CONFIRM)
59162 (SECUNIA)
58939 (SECUNIA)
59666 (SECUNIA)
59126 (SECUNIA)
http://www-01.ibm.com/support/docview.wss?uid=swg21677828 (CONFIRM)
59490 (SECUNIA)
http://www-01.ibm.com/support/docview.wss?uid=swg21676062 (CONFIRM)
https://kc.mcafee.com/corporate/index?page=content&id=SB10075 (CONFIRM)
http://www-01.ibm.com/support/docview.wss?uid=swg21676419 (CONFIRM)
http://www-01.ibm.com/support/docview.wss?uid=swg21678167 (CONFIRM)
http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-345106.htm (CONFIRM)
http://www-01.ibm.com/support/docview.wss?uid=swg21673137 (CONFIRM)
59514 (SECUNIA)
http://www-01.ibm.com/support/docview.wss?uid=swg21677527 (CONFIRM)
59669 (SECUNIA)
59413 (SECUNIA)
59300 (SECUNIA)
http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html (CONFIRM)
http://www.fortiguard.com/advisory/FG-IR-14-018/ (CONFIRM)
59342 (SECUNIA)
60049 (SECUNIA)
http://puppetlabs.com/security/cve/cve-2014-0198 (CONFIRM)
60066 (SECUNIA)
59990 (SECUNIA)
60571 (SECUNIA)
59784 (SECUNIA)
http://www.vmware.com/security/advisories/VMSA-2014-0012.html (CONFIRM)
20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities (FULLDISC)
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html (CONFIRM)
MDVSA-2015:062 (MANDRIVA)
HPSBMU03055 (HP)
HPSBHF03052 (HP)
HPSBMU03051 (HP)
HPSBMU03074 (HP)
HPSBGN03068 (HP)
HPSBMU03057 (HP)
HPSBMU03076 (HP)
HPSBMU03056 (HP)
HPSBMU03062 (HP)
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05301946 (CONFIRM)
SUSE-SU-2015:0743 (SUSE)
https://www.novell.com/support/kb/doc.php?id=7015271 (CONFIRM)
http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095757 (CONFIRM)
http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095756 (CONFIRM)
http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095755 (CONFIRM)
http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095754 (CONFIRM)
http://www-01.ibm.com/support/docview.wss?uid=swg21683332 (CONFIRM)
http://www-01.ibm.com/support/docview.wss?uid=swg21677836 (CONFIRM)
http://www-01.ibm.com/support/docview.wss?uid=swg21676889 (CONFIRM)
http://www-01.ibm.com/support/docview.wss?uid=swg21676879 (CONFIRM)
http://www-01.ibm.com/support/docview.wss?uid=swg21676529 (CONFIRM)
http://www-01.ibm.com/support/docview.wss?uid=nas8N1020163 (CONFIRM)
http://www.vmware.com/security/advisories/VMSA-2014-0006.html (CONFIRM)
67193 (BID)
MDVSA-2014:080 (MANDRIVA)
http://www.ibm.com/support/docview.wss?uid=swg24037783 (CONFIRM)
http://www.ibm.com/support/docview.wss?uid=swg21676356 (CONFIRM)
http://support.f5.com/kb/en-us/solutions/public/15000/300/sol15329.html (CONFIRM)
http://support.citrix.com/article/CTX140876 (CONFIRM)
GLSA-201407-05 (GENTOO)
61254 (SECUNIA)
59529 (SECUNIA)
59525 (SECUNIA)
59449 (SECUNIA)
59440 (SECUNIA)
59437 (SECUNIA)
59398 (SECUNIA)
59374 (SECUNIA)
59310 (SECUNIA)
59306 (SECUNIA)
59287 (SECUNIA)
59284 (SECUNIA)
59282 (SECUNIA)
59264 (SECUNIA)
59202 (SECUNIA)
59190 (SECUNIA)
59163 (SECUNIA)
58977 (SECUNIA)
58945 (SECUNIA)
58714 (SECUNIA)
58713 (SECUNIA)
58667 (SECUNIA)
58337 (SECUNIA)
FEDORA-2014-9308 (FEDORA)
FEDORA-2014-9301 (FEDORA)
http://kb.juniper.net/InfoCenter/index?page=content&id=KB29195 (CONFIRM)
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10629 (CONFIRM)
http://aix.software.ibm.com/aix/efixes/security/openssl_advisory9.asc (CONFIRM)
http://advisories.mageia.org/MGASA-2014-0204.html (CONFIRM)
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html (CONFIRM)
http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html (CONFIRM)
20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities (BUGTRAQ)
https://cert-portal.siemens.com/productcert/pdf/ssa-234763.pdf (CONFIRM)
CVE: CVE-2014-0221
CVE: CVE-2014-0221
Id:
CVE-2014-0221
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0221
Comment
: The dtls1_get_message_fragment function in d1_both.c in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h allows remote attackers to cause a denial of service (recursion and client crash) via a DTLS hello message in an invalid DTLS handshake.
CVSSv2 Score:
4.3
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:N/I:N/A:P
References:
https://bugzilla.redhat.com/show_bug.cgi?id=1103593 (CONFIRM)
http://www.openssl.org/news/secadv_20140605.txt (CONFIRM)
https://kb.bluecoat.com/index?page=content&id=SA80 (CONFIRM)
20140605 Multiple Vulnerabilities in OpenSSL Affecting Cisco Products (CISCO)
http://www.blackberry.com/btsc/KB36051 (CONFIRM)
http://www-01.ibm.com/support/docview.wss?uid=swg21676035 (CONFIRM)
59301 (SECUNIA)
59450 (SECUNIA)
59491 (SECUNIA)
59721 (SECUNIA)
http://www-01.ibm.com/support/docview.wss?uid=swg21677695 (CONFIRM)
59655 (SECUNIA)
59659 (SECUNIA)
59162 (SECUNIA)
http://www-01.ibm.com/support/docview.wss?uid=swg21678289 (CONFIRM)
59120 (SECUNIA)
59528 (SECUNIA)
58939 (SECUNIA)
59666 (SECUNIA)
59126 (SECUNIA)
http://www-01.ibm.com/support/docview.wss?uid=swg21677828 (CONFIRM)
59490 (SECUNIA)
http://www-01.ibm.com/support/docview.wss?uid=swg21676062 (CONFIRM)
https://kc.mcafee.com/corporate/index?page=content&id=SB10075 (CONFIRM)
http://www-01.ibm.com/support/docview.wss?uid=swg21676419 (CONFIRM)
http://www-01.ibm.com/support/docview.wss?uid=swg21678167 (CONFIRM)
http://www.novell.com/support/kb/doc.php?id=7015300 (CONFIRM)
http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-345106.htm (CONFIRM)
http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=6060&myns=phmc&mync=E (CONFIRM)
http://www-01.ibm.com/support/docview.wss?uid=swg21673137 (CONFIRM)
59514 (SECUNIA)
http://www-01.ibm.com/support/docview.wss?uid=swg21677527 (CONFIRM)
59495 (SECUNIA)
59669 (SECUNIA)
59413 (SECUNIA)
http://www.novell.com/support/kb/doc.php?id=7015264 (CONFIRM)
http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=6061&myns=phmc&mync=E (CONFIRM)
59300 (SECUNIA)
59895 (SECUNIA)
http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html (CONFIRM)
http://www.fortiguard.com/advisory/FG-IR-14-018/ (CONFIRM)
59342 (SECUNIA)
59451 (SECUNIA)
http://www-01.ibm.com/support/docview.wss?uid=isg400001843 (CONFIRM)
http://www-01.ibm.com/support/docview.wss?uid=isg400001841 (CONFIRM)
RHSA-2014:1021 (REDHAT)
59990 (SECUNIA)
59221 (SECUNIA)
60571 (SECUNIA)
http://linux.oracle.com/errata/ELSA-2014-1053.html (CONFIRM)
60687 (SECUNIA)
59784 (SECUNIA)
http://support.apple.com/kb/HT6443 (CONFIRM)
20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities (FULLDISC)
http://www.vmware.com/security/advisories/VMSA-2014-0012.html (CONFIRM)
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html (CONFIRM)
MDVSA-2015:062 (MANDRIVA)
HPSBMU03055 (HP)
HPSBMU03069 (HP)
HPSBUX03046 (HP)
HPSBMU03051 (HP)
HPSBMU03065 (HP)
HPSBMU03074 (HP)
HPSBGN03050 (HP)
HPSBMU03057 (HP)
HPSBOV03047 (HP)
HPSBMU03076 (HP)
HPSBMU03056 (HP)
HPSBMU03062 (HP)
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05301946 (CONFIRM)
openSUSE-SU-2016:0640 (SUSE)
SUSE-SU-2015:0743 (SUSE)
https://www.novell.com/support/kb/doc.php?id=7015271 (CONFIRM)
http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095757 (CONFIRM)
http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095756 (CONFIRM)
http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095755 (CONFIRM)
http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095754 (CONFIRM)
http://www-01.ibm.com/support/docview.wss?uid=swg21683332 (CONFIRM)
http://www-01.ibm.com/support/docview.wss?uid=swg21676889 (CONFIRM)
http://www-01.ibm.com/support/docview.wss?uid=swg21676879 (CONFIRM)
http://www-01.ibm.com/support/docview.wss?uid=swg21676071 (CONFIRM)
http://www-01.ibm.com/support/docview.wss?uid=swg21675821 (CONFIRM)
http://www-01.ibm.com/support/docview.wss?uid=nas8N1020163 (CONFIRM)
http://www.vmware.com/security/advisories/VMSA-2014-0006.html (CONFIRM)
1030337 (SECTRACK)
67901 (BID)
MDVSA-2014:106 (MANDRIVA)
MDVSA-2014:105 (MANDRIVA)
http://www.ibm.com/support/docview.wss?uid=swg24037783 (CONFIRM)
http://www.ibm.com/support/docview.wss?uid=swg21676793 (CONFIRM)
http://www.ibm.com/support/docview.wss?uid=swg21676356 (CONFIRM)
http://www.ibm.com/support/docview.wss?uid=swg21676226 (CONFIRM)
http://support.citrix.com/article/CTX140876 (CONFIRM)
GLSA-201407-05 (GENTOO)
61254 (SECUNIA)
59518 (SECUNIA)
59460 (SECUNIA)
59454 (SECUNIA)
59449 (SECUNIA)
59441 (SECUNIA)
59437 (SECUNIA)
59429 (SECUNIA)
59365 (SECUNIA)
59364 (SECUNIA)
59310 (SECUNIA)
59306 (SECUNIA)
59287 (SECUNIA)
59284 (SECUNIA)
59192 (SECUNIA)
59189 (SECUNIA)
59175 (SECUNIA)
59167 (SECUNIA)
59027 (SECUNIA)
58977 (SECUNIA)
58945 (SECUNIA)
58714 (SECUNIA)
58713 (SECUNIA)
58615 (SECUNIA)
58337 (SECUNIA)
FEDORA-2014-9308 (FEDORA)
FEDORA-2014-9301 (FEDORA)
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10629 (CONFIRM)
http://aix.software.ibm.com/aix/efixes/security/openssl_advisory9.asc (CONFIRM)
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html (CONFIRM)
http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html (CONFIRM)
20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities (BUGTRAQ)
https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=d3152655d5319ce883c8e3ac4b99f8de4c59d846 ()
CVE: CVE-2014-0224
CVE: CVE-2014-0224
Id:
CVE-2014-0224
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0224
Comment
: OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly restrict processing of ChangeCipherSpec messages, which allows man-in-the-middle attackers to trigger use of a zero-length master key in certain OpenSSL-to-OpenSSL communications, and consequently hijack sessions or obtain sensitive information, via a crafted TLS handshake, aka the "CCS Injection" vulnerability.
CVSSv2 Score:
5.8
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
PARTIAL
Availability impact:
NONE
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:N
CVSSv3 Score:
7.4
Attack vector:
NETWORK
Attack complexity:
HIGH
Privileges required:
NONE
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
HIGH
Availability impact:
NONE
CVSSv3 Vector:
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
CWE:
326 (Inadequate Encryption Strength)
References:
http://www.openssl.org/news/secadv_20140605.txt (CONFIRM)
http://ccsinjection.lepidum.co.jp (MISC)
VU#978508 (CERT-VN)
https://bugzilla.redhat.com/show_bug.cgi?id=1103586 (CONFIRM)
https://www.imperialviolet.org/2014/06/05/earlyccs.html (MISC)
https://access.redhat.com/site/blogs/766093/posts/908133 (CONFIRM)
59191 (SECUNIA)
58579 (SECUNIA)
https://kb.bluecoat.com/index?page=content&id=SA80 (CONFIRM)
20140605 Multiple Vulnerabilities in OpenSSL Affecting Cisco Products (CISCO)
http://www.kerio.com/support/kerio-control/release-history (CONFIRM)
59438 (SECUNIA)
http://www-01.ibm.com/support/docview.wss?uid=swg21676035 (CONFIRM)
59301 (SECUNIA)
59721 (SECUNIA)
59491 (SECUNIA)
59450 (SECUNIA)
http://www-01.ibm.com/support/docview.wss?uid=swg21676845 (CONFIRM)
59655 (SECUNIA)
http://www-01.ibm.com/support/docview.wss?uid=swg21677695 (CONFIRM)
59659 (SECUNIA)
58639 (SECUNIA)
http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5095737 (CONFIRM)
58759 (SECUNIA)
http://www-01.ibm.com/support/docview.wss?uid=swg21678289 (CONFIRM)
59043 (SECUNIA)
59666 (SECUNIA)
59126 (SECUNIA)
http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095740 (CONFIRM)
HPSBMU03070 (HP)
http://www-01.ibm.com/support/docview.wss?uid=swg21677567 (CONFIRM)
59055 (SECUNIA)
59490 (SECUNIA)
http://www-01.ibm.com/support/docview.wss?uid=swg21676419 (CONFIRM)
https://www.intersectalliance.com/wp-content/uploads/release_notes/ReleaseNotes_for_SNARE_for_MSSQL.pdf (CONFIRM)
http://www.novell.com/support/kb/doc.php?id=7015300 (CONFIRM)
http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-345106.htm (CONFIRM)
http://www-01.ibm.com/support/docview.wss?uid=swg21673137 (CONFIRM)
59514 (SECUNIA)
http://dev.mysql.com/doc/relnotes/workbench/en/wb-news-6-1-7.html (CONFIRM)
59602 (SECUNIA)
59495 (SECUNIA)
http://www.novell.com/support/kb/doc.php?id=7015264 (CONFIRM)
http://esupport.trendmicro.com/solution/en-US/1103813.aspx (CONFIRM)
58930 (SECUNIA)
59370 (SECUNIA)
59012 (SECUNIA)
http://www.blackberry.com/btsc/KB36051 (CONFIRM)
58385 (SECUNIA)
http://www-01.ibm.com/support/docview.wss?uid=swg21676655 (CONFIRM)
59120 (SECUNIA)
59162 (SECUNIA)
58939 (SECUNIA)
59528 (SECUNIA)
59063 (SECUNIA)
http://www-01.ibm.com/support/docview.wss?uid=swg21677828 (CONFIRM)
http://www-01.ibm.com/support/docview.wss?uid=nas8N1020172 (CONFIRM)
58128 (SECUNIA)
http://www-01.ibm.com/support/docview.wss?uid=swg21676062 (CONFIRM)
https://kc.mcafee.com/corporate/index?page=content&id=SB10075 (CONFIRM)
http://www-01.ibm.com/support/docview.wss?uid=swg21676496 (CONFIRM)
http://www-01.ibm.com/support/docview.wss?uid=swg21678167 (CONFIRM)
59442 (SECUNIA)
59824 (SECUNIA)
http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=6060&myns=phmc&mync=E (CONFIRM)
http://www-01.ibm.com/support/docview.wss?uid=swg21677527 (CONFIRM)
https://www.intersectalliance.com/wp-content/uploads/release_notes/ReleaseNotes_for_Snare_for_Windows.pdf (CONFIRM)
59827 (SECUNIA)
59669 (SECUNIA)
59413 (SECUNIA)
http://www-01.ibm.com/support/docview.wss?uid=swg24037761 (CONFIRM)
http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=6061&myns=phmc&mync=E (CONFIRM)
http://www-01.ibm.com/support/docview.wss?uid=swg21677390 (CONFIRM)
59300 (SECUNIA)
http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004690 (CONFIRM)
59383 (SECUNIA)
http://www.splunk.com/view/SP-CAAAM2D (CONFIRM)
https://discussions.nessus.org/thread/7517 (CONFIRM)
59885 (SECUNIA)
http://www.tenable.com/blog/nessus-527-and-pvs-403-are-available-for-download (CONFIRM)
http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html (CONFIRM)
59459 (SECUNIA)
58745 (SECUNIA)
59530 (SECUNIA)
59589 (SECUNIA)
59451 (SECUNIA)
http://www-01.ibm.com/support/docview.wss?uid=isg400001843 (CONFIRM)
http://www.fortiguard.com/advisory/FG-IR-14-018/ (CONFIRM)
59506 (SECUNIA)
https://filezilla-project.org/versions.php?type=server (CONFIRM)
http://www-01.ibm.com/support/docview.wss?uid=isg400001841 (CONFIRM)
59894 (SECUNIA)
60049 (SECUNIA)
https://blogs.oracle.com/sunsecurity/entry/cve_2014_0224_cryptographic_issues (CONFIRM)
58743 (SECUNIA)
59342 (SECUNIA)
59325 (SECUNIA)
59354 (SECUNIA)
59916 (SECUNIA)
RHSA-2014:0624 (REDHAT)
HPSBMU03058 (HP)
RHSA-2014:0631 (REDHAT)
RHSA-2014:0632 (REDHAT)
RHSA-2014:0630 (REDHAT)
RHSA-2014:0627 (REDHAT)
HPSBMU03053 (HP)
RHSA-2014:0680 (REDHAT)
RHSA-2014:0633 (REDHAT)
RHSA-2014:0626 (REDHAT)
60066 (SECUNIA)
http://puppetlabs.com/security/cve/cve-2014-0224 (CONFIRM)
59990 (SECUNIA)
60522 (SECUNIA)
http://linux.oracle.com/errata/ELSA-2014-1053.html (CONFIRM)
60577 (SECUNIA)
59784 (SECUNIA)
59878 (SECUNIA)
60176 (SECUNIA)
60567 (SECUNIA)
60571 (SECUNIA)
60819 (SECUNIA)
http://support.apple.com/kb/HT6443 (CONFIRM)
http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html (CONFIRM)
HPSBST03103 (HP)
HPSBHF03145 (HP)
HPSBST03106 (HP)
HPSBST03097 (HP)
HPSBPI03107 (HP)
HPSBMU03083 (HP)
61815 (SECUNIA)
1031032 (SECTRACK)
http://www.vmware.com/security/advisories/VMSA-2014-0012.html (CONFIRM)
20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities (FULLDISC)
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html (CONFIRM)
1031594 (SECTRACK)
HPSBST03265 (HP)
SSRT101818 (HP)
openSUSE-SU-2015:0229 (SUSE)
SUSE-SU-2015:0578 (SUSE)
http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0 (CONFIRM)
MDVSA-2015:062 (MANDRIVA)
HPSBST03195 (HP)
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html (CONFIRM)
HPSBHF03052 (HP)
HPSBMU03051 (HP)
HPSBMU03065 (HP)
HPSBMU03074 (HP)
HPSBGN03050 (HP)
HPSBST03098 (HP)
HPSBMU03089 (HP)
HPSBMU03101 (HP)
HPSBMU03071 (HP)
HPSBMU03055 (HP)
HPSBUX03046 (HP)
HPSBMU03094 (HP)
HPSBGN03068 (HP)
HPSBMU03057 (HP)
HPSBMU03078 (HP)
HPSBOV03047 (HP)
HPSBMU03076 (HP)
HPSBMU03056 (HP)
HPSBMU03062 (HP)
HPSBHF03088 (HP)
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05301946 (CONFIRM)
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html (CONFIRM)
openSUSE-SU-2016:0640 (SUSE)
SUSE-SU-2015:0743 (SUSE)
https://www.novell.com/support/kb/doc.php?id=7015271 (CONFIRM)
https://www.ibm.com/support/docview.wss?uid=ssg1S1004671 (CONFIRM)
https://www.ibm.com/support/docview.wss?uid=ssg1S1004670 (CONFIRM)
https://blogs.oracle.com/sunsecurity/entry/cve_2014_0224_cryptographic_issues1 (CONFIRM)
http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095757 (CONFIRM)
http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095756 (CONFIRM)
http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095755 (CONFIRM)
http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095754 (CONFIRM)
http://www-01.ibm.com/support/docview.wss?uid=swg24037870 (CONFIRM)
http://www-01.ibm.com/support/docview.wss?uid=swg24037732 (CONFIRM)
http://www-01.ibm.com/support/docview.wss?uid=swg24037731 (CONFIRM)
http://www-01.ibm.com/support/docview.wss?uid=swg24037730 (CONFIRM)
http://www-01.ibm.com/support/docview.wss?uid=swg24037729 (CONFIRM)
http://www-01.ibm.com/support/docview.wss?uid=swg24037727 (CONFIRM)
http://www-01.ibm.com/support/docview.wss?uid=swg21683332 (CONFIRM)
http://www-01.ibm.com/support/docview.wss?uid=swg21678233 (CONFIRM)
http://www-01.ibm.com/support/docview.wss?uid=swg21677836 (CONFIRM)
http://www-01.ibm.com/support/docview.wss?uid=swg21677131 (CONFIRM)
http://www-01.ibm.com/support/docview.wss?uid=swg21677080 (CONFIRM)
http://www-01.ibm.com/support/docview.wss?uid=swg21676889 (CONFIRM)
http://www-01.ibm.com/support/docview.wss?uid=swg21676879 (CONFIRM)
http://www-01.ibm.com/support/docview.wss?uid=swg21676833 (CONFIRM)
http://www-01.ibm.com/support/docview.wss?uid=swg21676786 (CONFIRM)
http://www-01.ibm.com/support/docview.wss?uid=swg21676644 (CONFIRM)
http://www-01.ibm.com/support/docview.wss?uid=swg21676615 (CONFIRM)
http://www-01.ibm.com/support/docview.wss?uid=swg21676536 (CONFIRM)
http://www-01.ibm.com/support/docview.wss?uid=swg21676529 (CONFIRM)
http://www-01.ibm.com/support/docview.wss?uid=swg21676501 (CONFIRM)
http://www-01.ibm.com/support/docview.wss?uid=swg21676478 (CONFIRM)
http://www-01.ibm.com/support/docview.wss?uid=swg21676334 (CONFIRM)
http://www-01.ibm.com/support/docview.wss?uid=swg21676333 (CONFIRM)
http://www-01.ibm.com/support/docview.wss?uid=swg21676071 (CONFIRM)
http://www-01.ibm.com/support/docview.wss?uid=swg21675821 (CONFIRM)
http://www-01.ibm.com/support/docview.wss?uid=swg21675626 (CONFIRM)
IV61506 (AIXAPAR)
http://www-01.ibm.com/support/docview.wss?uid=nas8N1020163 (CONFIRM)
http://www.vmware.com/security/advisories/VMSA-2014-0006.html (CONFIRM)
MDVSA-2014:106 (MANDRIVA)
MDVSA-2014:105 (MANDRIVA)
http://www.innominate.com/data/downloads/manuals/mdm_1.5.2.1_Release_Notes.pdf (CONFIRM)
http://www.ibm.com/support/docview.wss?uid=swg24037783 (CONFIRM)
http://www.ibm.com/support/docview.wss?uid=swg21676877 (CONFIRM)
http://www.ibm.com/support/docview.wss?uid=swg21676793 (CONFIRM)
http://www.ibm.com/support/docview.wss?uid=swg21676356 (CONFIRM)
IT02314 (AIXAPAR)
http://www.ibm.com/support/docview.wss?uid=ssg1S1004678 (CONFIRM)
http://www.ibm.com/support/docview.wss?uid=isg3T1020948 (CONFIRM)
http://www.f-secure.com/en/web/labs_global/fsc-2014-6 (CONFIRM)
http://support.f5.com/kb/en-us/solutions/public/15000/300/sol15325.html (CONFIRM)
http://support.citrix.com/article/CTX140876 (CONFIRM)
GLSA-201407-05 (GENTOO)
61254 (SECUNIA)
59677 (SECUNIA)
59661 (SECUNIA)
59529 (SECUNIA)
59525 (SECUNIA)
59518 (SECUNIA)
59502 (SECUNIA)
59483 (SECUNIA)
59460 (SECUNIA)
59454 (SECUNIA)
59449 (SECUNIA)
59448 (SECUNIA)
59447 (SECUNIA)
59446 (SECUNIA)
59445 (SECUNIA)
59444 (SECUNIA)
59441 (SECUNIA)
59440 (SECUNIA)
59437 (SECUNIA)
59435 (SECUNIA)
59429 (SECUNIA)
59389 (SECUNIA)
59380 (SECUNIA)
59375 (SECUNIA)
59374 (SECUNIA)
59368 (SECUNIA)
59365 (SECUNIA)
59364 (SECUNIA)
59362 (SECUNIA)
59347 (SECUNIA)
59338 (SECUNIA)
59310 (SECUNIA)
59306 (SECUNIA)
59305 (SECUNIA)
59287 (SECUNIA)
59284 (SECUNIA)
59282 (SECUNIA)
59264 (SECUNIA)
59231 (SECUNIA)
59223 (SECUNIA)
59215 (SECUNIA)
59214 (SECUNIA)
59211 (SECUNIA)
59202 (SECUNIA)
59192 (SECUNIA)
59190 (SECUNIA)
59189 (SECUNIA)
59188 (SECUNIA)
59186 (SECUNIA)
59175 (SECUNIA)
59167 (SECUNIA)
59163 (SECUNIA)
59142 (SECUNIA)
59135 (SECUNIA)
59132 (SECUNIA)
59101 (SECUNIA)
59093 (SECUNIA)
59040 (SECUNIA)
59004 (SECUNIA)
58977 (SECUNIA)
58945 (SECUNIA)
58742 (SECUNIA)
58719 (SECUNIA)
58716 (SECUNIA)
58714 (SECUNIA)
58713 (SECUNIA)
58667 (SECUNIA)
58660 (SECUNIA)
58615 (SECUNIA)
58492 (SECUNIA)
58433 (SECUNIA)
58337 (SECUNIA)
20140607 Re: More OpenSSL issues (FULLDISC)
FEDORA-2014-9308 (FEDORA)
FEDORA-2014-9301 (FEDORA)
http://kb.juniper.net/InfoCenter/index?page=content&id=KB29217 (CONFIRM)
http://kb.juniper.net/InfoCenter/index?page=content&id=KB29195 (CONFIRM)
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10629 (CONFIRM)
http://aix.software.ibm.com/aix/efixes/security/openssl_advisory9.asc (CONFIRM)
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html (CONFIRM)
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html (CONFIRM)
20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities (BUGTRAQ)
https://cert-portal.siemens.com/productcert/pdf/ssa-234763.pdf (CONFIRM)
https://www.arista.com/en/support/advisories-notices/security-advisories/941-security-advisory-0005 (MISC)
https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=bc8923b1ec9c467755cd86f7848c50ee8812e441 ()
CVE: CVE-2014-3470
CVE: CVE-2014-3470
Id:
CVE-2014-3470
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3470
Comment
: The ssl3_send_client_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h, when an anonymous ECDH cipher suite is used, allows remote attackers to cause a denial of service (NULL pointer dereference and client crash) by triggering a NULL certificate value.
CVSSv2 Score:
4.3
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:N/I:N/A:P
CWE:
476 (NULL Pointer Dereference)
References:
http://www.openssl.org/news/secadv_20140605.txt (CONFIRM)
https://bugzilla.redhat.com/show_bug.cgi?id=1103600 (CONFIRM)
67898 (BID)
58797 (SECUNIA)
59191 (SECUNIA)
58579 (SECUNIA)
https://kb.bluecoat.com/index?page=content&id=SA80 (CONFIRM)
20140605 Multiple Vulnerabilities in OpenSSL Affecting Cisco Products (CISCO)
http://www.blackberry.com/btsc/KB36051 (CONFIRM)
http://www-01.ibm.com/support/docview.wss?uid=swg21676035 (CONFIRM)
59438 (SECUNIA)
59301 (SECUNIA)
59450 (SECUNIA)
59491 (SECUNIA)
59721 (SECUNIA)
http://www-01.ibm.com/support/docview.wss?uid=swg21677695 (CONFIRM)
59655 (SECUNIA)
59659 (SECUNIA)
59162 (SECUNIA)
59120 (SECUNIA)
http://www-01.ibm.com/support/docview.wss?uid=swg21676655 (CONFIRM)
http://www-01.ibm.com/support/docview.wss?uid=swg21678289 (CONFIRM)
58939 (SECUNIA)
59666 (SECUNIA)
59126 (SECUNIA)
http://www-01.ibm.com/support/docview.wss?uid=swg21677828 (CONFIRM)
http://www-01.ibm.com/support/docview.wss?uid=swg21676062 (CONFIRM)
59490 (SECUNIA)
https://kc.mcafee.com/corporate/index?page=content&id=SB10075 (CONFIRM)
http://www-01.ibm.com/support/docview.wss?uid=swg21676496 (CONFIRM)
http://www-01.ibm.com/support/docview.wss?uid=swg21676419 (CONFIRM)
http://www-01.ibm.com/support/docview.wss?uid=swg21678167 (CONFIRM)
59442 (SECUNIA)
http://www.novell.com/support/kb/doc.php?id=7015300 (CONFIRM)
http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-345106.htm (CONFIRM)
http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=6060&myns=phmc&mync=E (CONFIRM)
http://www-01.ibm.com/support/docview.wss?uid=swg21673137 (CONFIRM)
59514 (SECUNIA)
http://www-01.ibm.com/support/docview.wss?uid=swg21677527 (CONFIRM)
59495 (SECUNIA)
59669 (SECUNIA)
59413 (SECUNIA)
http://www.novell.com/support/kb/doc.php?id=7015264 (CONFIRM)
http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=6061&myns=phmc&mync=E (CONFIRM)
http://www-01.ibm.com/support/docview.wss?uid=swg24037761 (CONFIRM)
59300 (SECUNIA)
http://www.splunk.com/view/SP-CAAAM2D (CONFIRM)
59895 (SECUNIA)
http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html (CONFIRM)
59459 (SECUNIA)
59451 (SECUNIA)
http://www-01.ibm.com/support/docview.wss?uid=isg400001843 (CONFIRM)
59342 (SECUNIA)
http://www-01.ibm.com/support/docview.wss?uid=isg400001841 (CONFIRM)
59916 (SECUNIA)
59990 (SECUNIA)
60571 (SECUNIA)
59784 (SECUNIA)
http://support.apple.com/kb/HT6443 (CONFIRM)
20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities (FULLDISC)
http://www-01.ibm.com/support/docview.wss?uid=swg21683332 (CONFIRM)
http://www-01.ibm.com/support/docview.wss?uid=swg21677836 (CONFIRM)
http://www-01.ibm.com/support/docview.wss?uid=swg21676889 (CONFIRM)
http://www-01.ibm.com/support/docview.wss?uid=swg21676879 (CONFIRM)
http://www-01.ibm.com/support/docview.wss?uid=swg21676615 (CONFIRM)
http://www-01.ibm.com/support/docview.wss?uid=swg21676529 (CONFIRM)
http://www-01.ibm.com/support/docview.wss?uid=swg21676501 (CONFIRM)
http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095754 (CONFIRM)
http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095755 (CONFIRM)
http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095756 (CONFIRM)
http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095757 (CONFIRM)
https://www.novell.com/support/kb/doc.php?id=7015271 (CONFIRM)
SUSE-SU-2015:0743 (SUSE)
openSUSE-SU-2016:0640 (SUSE)
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05301946 (CONFIRM)
HPSBMU03062 (HP)
HPSBMU03056 (HP)
HPSBMU03076 (HP)
HPSBOV03047 (HP)
HPSBMU03057 (HP)
HPSBGN03050 (HP)
HPSBMU03074 (HP)
HPSBMU03065 (HP)
HPSBMU03051 (HP)
HPSBUX03046 (HP)
HPSBMU03069 (HP)
HPSBMU03055 (HP)
MDVSA-2015:062 (MANDRIVA)
SUSE-SU-2015:0578 (SUSE)
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html (CONFIRM)
http://www.vmware.com/security/advisories/VMSA-2014-0012.html (CONFIRM)
http://www-01.ibm.com/support/docview.wss?uid=swg21676071 (CONFIRM)
59365 (SECUNIA)
59364 (SECUNIA)
59362 (SECUNIA)
59340 (SECUNIA)
59310 (SECUNIA)
59306 (SECUNIA)
59287 (SECUNIA)
59284 (SECUNIA)
59282 (SECUNIA)
59264 (SECUNIA)
59223 (SECUNIA)
59192 (SECUNIA)
59189 (SECUNIA)
59175 (SECUNIA)
59167 (SECUNIA)
58977 (SECUNIA)
58945 (SECUNIA)
58742 (SECUNIA)
58716 (SECUNIA)
58714 (SECUNIA)
58713 (SECUNIA)
58667 (SECUNIA)
58615 (SECUNIA)
58337 (SECUNIA)
FEDORA-2014-9308 (FEDORA)
FEDORA-2014-9301 (FEDORA)
http://kb.juniper.net/InfoCenter/index?page=content&id=KB29195 (CONFIRM)
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10629 (CONFIRM)
http://aix.software.ibm.com/aix/efixes/security/openssl_advisory9.asc (CONFIRM)
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html (CONFIRM)
http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html (CONFIRM)
20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities (BUGTRAQ)
http://www-01.ibm.com/support/docview.wss?uid=swg21675821 (CONFIRM)
http://www-01.ibm.com/support/docview.wss?uid=swg21675626 (CONFIRM)
http://www-01.ibm.com/support/docview.wss?uid=nas8N1020163 (CONFIRM)
http://www.vmware.com/security/advisories/VMSA-2014-0006.html (CONFIRM)
MDVSA-2014:106 (MANDRIVA)
MDVSA-2014:105 (MANDRIVA)
http://www.ibm.com/support/docview.wss?uid=swg24037783 (CONFIRM)
http://www.ibm.com/support/docview.wss?uid=swg21676793 (CONFIRM)
http://www.ibm.com/support/docview.wss?uid=swg21676356 (CONFIRM)
http://www.f-secure.com/en/web/labs_global/fsc-2014-6 (CONFIRM)
http://support.f5.com/kb/en-us/solutions/public/15000/300/sol15342.html (CONFIRM)
http://support.citrix.com/article/CTX140876 (CONFIRM)
GLSA-201407-05 (GENTOO)
61254 (SECUNIA)
59525 (SECUNIA)
59518 (SECUNIA)
59483 (SECUNIA)
59460 (SECUNIA)
59449 (SECUNIA)
59445 (SECUNIA)
59441 (SECUNIA)
59440 (SECUNIA)
59437 (SECUNIA)
59431 (SECUNIA)
https://cert-portal.siemens.com/productcert/pdf/ssa-234763.pdf (CONFIRM)
https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=8011cd56e39a433b1837465259a9bd24a38727fb ()
CVE: CVE-2014-6474
CVE: CVE-2014-6474
Id:
CVE-2014-6474
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6474
Comment
: Unspecified vulnerability in Oracle MySQL Server 5.6.19 and earlier allows remote authenticated users to affect availability via vectors related to SERVER:MEMCACHED.
CVSSv2 Score:
3.5
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
SINGLE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:M/Au:S/C:N/I:N/A:P
References:
http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html (CONFIRM)
SUSE-SU-2015:0743 (SUSE)
CVE: CVE-2014-6489
CVE: CVE-2014-6489
Id:
CVE-2014-6489
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6489
Comment
: Unspecified vulnerability in Oracle MySQL Server 5.6.19 and earlier allows remote authenticated users to affect integrity and availability via vectors related to SERVER:SP.
CVSSv2 Score:
5.5
Access vector:
NETWORK
Access complexity:
LOW
Authentication:
SINGLE
Confidentiality impact:
NONE
Integrity impact:
PARTIAL
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:L/Au:S/C:N/I:P/A:P
References:
http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html (CONFIRM)
70525 (BID)
SUSE-SU-2015:0743 (SUSE)
CVE: CVE-2014-6564
CVE: CVE-2014-6564
Id:
CVE-2014-6564
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6564
Comment
: Unspecified vulnerability in Oracle MySQL Server 5.6.19 and earlier allows remote authenticated users to affect availability via vectors related to SERVER:INNODB FULLTEXT SEARCH DML.
CVSSv2 Score:
4
Access vector:
NETWORK
Access complexity:
LOW
Authentication:
SINGLE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:L/Au:S/C:N/I:N/A:P
References:
http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html (CONFIRM)
70511 (BID)
SUSE-SU-2015:0743 (SUSE)
CVE: CVE-2012-5615
CVE: CVE-2012-5615
Id:
CVE-2012-5615
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5615
Comment
: Oracle MySQL 5.5.38 and earlier, 5.6.19 and earlier, and MariaDB 5.5.28a, 5.3.11, 5.2.13, 5.1.66, and possibly other versions, generates different error messages with different time delays depending on whether a user name exists, which allows remote attackers to enumerate valid usernames.
CVSSv2 Score:
5
Access vector:
NETWORK
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
NONE
Availability impact:
NONE
CVSSv2 Vector:
AV:N/AC:L/Au:N/C:P/I:N/A:N
CWE:
200 (Information Exposure)
References:
https://mariadb.atlassian.net/browse/MDEV-3909 (CONFIRM)
20121201 MySQL Remote Preauth User Enumeration Zeroday (FULLDISC)
[oss-security] 20121202 Re: Re: [Full-disclosure] MySQL (Linux) Stack based buffer overrun PoC Zeroday (MLIST)
[oss-security] 20121202 Re: Re: [Full-disclosure] MySQL (Linux) Stack based buffer overrun PoC Zeroday (MLIST)
SUSE-SU-2013:0262 (SUSE)
GLSA-201308-06 (GENTOO)
MDVSA-2013:102 (MANDRIVA)
53372 (SECUNIA)
http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html (CONFIRM)
http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html (CONFIRM)
SUSE-SU-2015:0743 (SUSE)
CVE: CVE-2014-4274
CVE: CVE-2014-4274
Id:
CVE-2014-4274
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4274
Comment
: Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier and 5.6.19 and earlier allows local users to affect confidentiality, integrity, and availability via vectors related to SERVER:MyISAM.
CVSSv2 Score:
4.1
Access vector:
LOCAL
Access complexity:
MEDIUM
Authentication:
SINGLE
Confidentiality impact:
PARTIAL
Integrity impact:
PARTIAL
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:L/AC:M/Au:S/C:P/I:P/A:P
References:
http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html (CONFIRM)
69732 (BID)
http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html (CONFIRM)
SUSE-SU-2015:0743 (SUSE)
CVE: CVE-2014-4287
CVE: CVE-2014-4287
Id:
CVE-2014-4287
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4287
Comment
: Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier and 5.6.19 and earlier allows remote authenticated users to affect availability via vectors related to SERVER:CHARACTER SETS.
CVSSv2 Score:
4
Access vector:
NETWORK
Access complexity:
LOW
Authentication:
SINGLE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:L/Au:S/C:N/I:N/A:P
References:
http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html (CONFIRM)
70517 (BID)
http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html (CONFIRM)
SUSE-SU-2015:0743 (SUSE)
CVE: CVE-2014-6463
CVE: CVE-2014-6463
Id:
CVE-2014-6463
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6463
Comment
: Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier and 5.6.19 and earlier allows remote authenticated users to affect availability via vectors related to SERVER:REPLICATION ROW FORMAT BINARY LOG DML.
CVSSv2 Score:
3.3
Access vector:
NETWORK
Access complexity:
LOW
Authentication:
MULTIPLE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:L/Au:M/C:N/I:N/A:P
References:
http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html (CONFIRM)
70532 (BID)
http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html (CONFIRM)
SUSE-SU-2015:0743 (SUSE)
CVE: CVE-2014-6478
CVE: CVE-2014-6478
Id:
CVE-2014-6478
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6478
Comment
: Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier, and 5.6.19 and earlier, allows remote attackers to affect integrity via vectors related to SERVER:SSL:yaSSL.
CVSSv2 Score:
4.3
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
PARTIAL
Availability impact:
NONE
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:N/I:P/A:N
References:
http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html (CONFIRM)
70489 (BID)
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698 (CONFIRM)
http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html (CONFIRM)
SUSE-SU-2015:0743 (SUSE)
CVE: CVE-2014-6484
CVE: CVE-2014-6484
Id:
CVE-2014-6484
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6484
Comment
: Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier, and 5.6.19 and earlier, allows remote authenticated users to affect availability via vectors related to SERVER:DML.
CVSSv2 Score:
4
Access vector:
NETWORK
Access complexity:
LOW
Authentication:
SINGLE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:L/Au:S/C:N/I:N/A:P
References:
http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html (CONFIRM)
70455 (BID)
http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html (CONFIRM)
SUSE-SU-2015:0743 (SUSE)
CVE: CVE-2014-6495
CVE: CVE-2014-6495
Id:
CVE-2014-6495
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6495
Comment
: Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier, and 5.6.19 and earlier, allows remote attackers to affect availability via vectors related to SERVER:SSL:yaSSL.
CVSSv2 Score:
4.3
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:N/I:N/A:P
References:
http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html (CONFIRM)
70496 (BID)
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698 (CONFIRM)
http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html (CONFIRM)
SUSE-SU-2015:0743 (SUSE)
CVE: CVE-2014-6505
CVE: CVE-2014-6505
Id:
CVE-2014-6505
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6505
Comment
: Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier, and 5.6.19 and earlier, allows remote authenticated users to affect availability via vectors related to SERVER:MEMORY STORAGE ENGINE.
CVSSv2 Score:
4
Access vector:
NETWORK
Access complexity:
LOW
Authentication:
SINGLE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:L/Au:S/C:N/I:N/A:P
References:
http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html (CONFIRM)
70516 (BID)
http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html (CONFIRM)
SUSE-SU-2015:0743 (SUSE)
CVE: CVE-2014-6520
CVE: CVE-2014-6520
Id:
CVE-2014-6520
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6520
Comment
: Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier allows remote authenticated users to affect availability via vectors related to SERVER:DDL.
CVSSv2 Score:
4
Access vector:
NETWORK
Access complexity:
LOW
Authentication:
SINGLE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:L/Au:S/C:N/I:N/A:P
References:
http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html (CONFIRM)
70510 (BID)
http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html (CONFIRM)
SUSE-SU-2015:0743 (SUSE)
CVE: CVE-2014-6530
CVE: CVE-2014-6530
Id:
CVE-2014-6530
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6530
Comment
: Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier, and 5.6.19 and earlier, allows remote authenticated users to affect confidentiality, integrity, and availability via vectors related to CLIENT:MYSQLDUMP.
CVSSv2 Score:
6.5
Access vector:
NETWORK
Access complexity:
LOW
Authentication:
SINGLE
Confidentiality impact:
PARTIAL
Integrity impact:
PARTIAL
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:L/Au:S/C:P/I:P/A:P
References:
http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html (CONFIRM)
70486 (BID)
http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html (CONFIRM)
SUSE-SU-2015:0743 (SUSE)
CVE: CVE-2014-6551
CVE: CVE-2014-6551
Id:
CVE-2014-6551
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6551
Comment
: Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier and 5.6.19 and earlier allows local users to affect confidentiality via vectors related to CLIENT:MYSQLADMIN.
CVSSv2 Score:
2.1
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
NONE
Availability impact:
NONE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:P/I:N/A:N
References:
http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html (CONFIRM)
70462 (BID)
http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html (CONFIRM)
SUSE-SU-2015:0743 (SUSE)
CVE: CVE-2015-0391
CVE: CVE-2015-0391
Id:
CVE-2015-0391
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0391
Comment
: Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier, and 5.6.19 and earlier, allows remote authenticated users to affect availability via vectors related to DDL.
CVSSv2 Score:
4
Access vector:
NETWORK
Access complexity:
LOW
Authentication:
SINGLE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:L/Au:S/C:N/I:N/A:P
References:
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html (CONFIRM)
72205 (BID)
62732 (SECUNIA)
62730 (SECUNIA)
62728 (SECUNIA)
1031581 (SECTRACK)
RHSA-2015:0116 (REDHAT)
RHSA-2015:0117 (REDHAT)
RHSA-2015:0118 (REDHAT)
GLSA-201504-05 (GENTOO)
RHSA-2015:1628 (REDHAT)
SUSE-SU-2015:0743 (SUSE)
oracle-cpujan2015-cve20150391(100186) (XF)
CVE: CVE-2014-4258
CVE: CVE-2014-4258
Id:
CVE-2014-4258
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4258
Comment
: Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.37 and earlier and 5.6.17 and earlier allows remote authenticated users to affect confidentiality, integrity, and availability via vectors related to SRINFOSC.
CVSSv2 Score:
6.5
Access vector:
NETWORK
Access complexity:
LOW
Authentication:
SINGLE
Confidentiality impact:
PARTIAL
Integrity impact:
PARTIAL
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:L/Au:S/C:P/I:P/A:P
References:
http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html (CONFIRM)
68564 (BID)
DSA-2985 (DEBIAN)
SUSE-SU-2014:1072 (SUSE)
http://www.vmware.com/security/advisories/VMSA-2014-0012.html (CONFIRM)
20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities (FULLDISC)
http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html (CONFIRM)
SUSE-SU-2015:0743 (SUSE)
1030578 (SECTRACK)
60425 (SECUNIA)
oracle-cpujul2014-cve20144258(94620) (XF)
20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities (BUGTRAQ)
CVE: CVE-2014-4260
CVE: CVE-2014-4260
Id:
CVE-2014-4260
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4260
Comment
: Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.37 and earlier, and 5.6.17 and earlier, allows remote authenticated users to affect integrity and availability via vectors related to SRCHAR.
CVSSv2 Score:
5.5
Access vector:
NETWORK
Access complexity:
LOW
Authentication:
SINGLE
Confidentiality impact:
NONE
Integrity impact:
PARTIAL
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:L/Au:S/C:N/I:P/A:P
References:
http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html (CONFIRM)
68573 (BID)
DSA-2985 (DEBIAN)
SUSE-SU-2014:1072 (SUSE)
http://www.vmware.com/security/advisories/VMSA-2014-0012.html (CONFIRM)
20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities (FULLDISC)
http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html (CONFIRM)
SUSE-SU-2015:0743 (SUSE)
1030578 (SECTRACK)
60425 (SECUNIA)
oracle-cpujul2014-cve20144260(94621) (XF)
20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities (BUGTRAQ)
CVE: CVE-2014-2494
CVE: CVE-2014-2494
Id:
CVE-2014-2494
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2494
Comment
: Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.37 and earlier allows remote authenticated users to affect availability via vectors related to ENARC.
CVSSv2 Score:
4
Access vector:
NETWORK
Access complexity:
LOW
Authentication:
SINGLE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:L/Au:S/C:N/I:N/A:P
References:
http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html (CONFIRM)
DSA-2985 (DEBIAN)
SUSE-SU-2014:1072 (SUSE)
http://www.vmware.com/security/advisories/VMSA-2014-0012.html (CONFIRM)
20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities (FULLDISC)
http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html (CONFIRM)
SUSE-SU-2015:0743 (SUSE)
1030578 (SECTRACK)
60425 (SECUNIA)
20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities (BUGTRAQ)
CVE: CVE-2014-4207
CVE: CVE-2014-4207
Id:
CVE-2014-4207
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4207
Comment
: Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.37 and earlier allows remote authenticated users to affect availability via vectors related to SROPTZR.
CVSSv2 Score:
4
Access vector:
NETWORK
Access complexity:
LOW
Authentication:
SINGLE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:L/Au:S/C:N/I:N/A:P
References:
http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html (CONFIRM)
68593 (BID)
DSA-2985 (DEBIAN)
SUSE-SU-2014:1072 (SUSE)
http://www.vmware.com/security/advisories/VMSA-2014-0012.html (CONFIRM)
20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities (FULLDISC)
http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html (CONFIRM)
SUSE-SU-2015:0743 (SUSE)
1030578 (SECTRACK)
60425 (SECUNIA)
oracle-cpujul2014-cve20144207(94624) (XF)
20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities (BUGTRAQ)
Content available only for registered users!
ovaldb@altx-soft.com