Vulnerability Name:

CVE-2014-3509

Assigned:2014-08-06
Published:2014-08-06
Updated:2017-11-14
Summary:Race condition in the ssl_parse_serverhello_tlsext function in t1_lib.c in OpenSSL 1.0.0 before 1.0.0n and 1.0.1 before 1.0.1i, when multithreading and session resumption are used, allows remote SSL servers to cause a denial of service (memory overwrite and client application crash) or possibly have unspecified other impact by sending Elliptic Curve (EC) Supported Point Formats Extension data.
CVSS v3 Severity:5.3 Medium (CCN CVSS v3 Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Low
CVSS v2 Severity:6.8 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P)
5.0 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
4.3 Medium (CCN CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P)
3.2 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
5.1 Medium (REDHAT CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P)
3.8 Low (REDHAT Temporal CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): High
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-362
References:Source: NETBSD
Type: UNKNOWN
NetBSD-SA2014-008

Source: CONFIRM
Type: UNKNOWN
http://aix.software.ibm.com/aix/efixes/security/openssl_advisory10.asc

Source: CONFIRM
Type: UNKNOWN
http://linux.oracle.com/errata/ELSA-2014-1052.html

Source: FEDORA
Type: UNKNOWN
FEDORA-2014-9301

Source: FEDORA
Type: UNKNOWN
FEDORA-2014-9308

Source: SUSE
Type: UNKNOWN
openSUSE-SU-2014:1052

Source: HP
Type: UNKNOWN
SSRT101818

Source: HP
Type: UNKNOWN
SSRT101894

Source: HP
Type: UNKNOWN
HPSBMU03267

Source: HP
Type: UNKNOWN
SSRT101846

Source: HP
Type: UNKNOWN
HPSBMU03304

Source: HP
Type: UNKNOWN
HPSBMU03263

Source: HP
Type: UNKNOWN
HPSBMU03261

Source: REDHAT
Type: UNKNOWN
RHSA-2015:0197

Source: SECUNIA
Type: UNKNOWN
58962

Source: SECUNIA
Type: UNKNOWN
59700

Source: SECUNIA
Type: UNKNOWN
59710

Source: SECUNIA
Type: UNKNOWN
60022

Source: SECUNIA
Type: UNKNOWN
60221

Source: SECUNIA
Type: UNKNOWN
60493

Source: SECUNIA
Type: UNKNOWN
60684

Source: SECUNIA
Type: UNKNOWN
60803

Source: SECUNIA
Type: UNKNOWN
61017

Source: SECUNIA
Type: UNKNOWN
61100

Source: SECUNIA
Type: UNKNOWN
61139

Source: SECUNIA
Type: UNKNOWN
61184

Source: GENTOO
Type: UNKNOWN
GLSA-201412-39

Source: CONFIRM
Type: UNKNOWN
http://www-01.ibm.com/support/docview.wss?uid=nas8N1020240

Source: CONFIRM
Type: UNKNOWN
http://www-01.ibm.com/support/docview.wss?uid=swg21682293

Source: CONFIRM
Type: UNKNOWN
http://www-01.ibm.com/support/docview.wss?uid=swg21683389

Source: CONFIRM
Type: UNKNOWN
http://www-01.ibm.com/support/docview.wss?uid=swg21686997

Source: DEBIAN
Type: UNKNOWN
DSA-2998

Source: CONFIRM
Type: UNKNOWN
http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-372998.htm

Source: MANDRIVA
Type: UNKNOWN
MDVSA-2014:158

Source: BID
Type: UNKNOWN
69084

Source: SECTRACK
Type: UNKNOWN
1030693

Source: CONFIRM
Type: UNKNOWN
https://bugzilla.redhat.com/show_bug.cgi?id=1127498

Source: XF
Type: UNKNOWN
openssl-cve20143509-dos(95159)

Source: CONFIRM
Type: UNKNOWN
https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=fb0bc2b273bcc2d5401dd883fe869af4fc74bb21

Source: CONFIRM
Type: UNKNOWN
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888

Source: CONFIRM
Type: UNKNOWN
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380

Source: MLIST
Type: UNKNOWN
[syslog-ng-announce] 20140910 syslog-ng Premium Edition 5 LTS (5.0.6a) has been released

Source: CONFIRM
Type: UNKNOWN
https://support.citrix.com/article/CTX216642

Source: CONFIRM
Type: UNKNOWN
https://techzone.ergon.ch/CVE-2014-3511

Source: FREEBSD
Type: UNKNOWN
FreeBSD-SA-14:18

Source: CONFIRM
Type: VENDOR_ADVISORY
https://www.openssl.org/news/secadv_20140806.txt

Vulnerable Configuration:Configuration 1:
  • cpe:/a:openssl:openssl:1.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:1.0.0:beta1:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:1.0.0:beta2:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:1.0.0:beta3:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:1.0.0:beta4:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:1.0.0:beta5:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:1.0.0a:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:1.0.0b:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:1.0.0c:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:1.0.0d:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:1.0.0e:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:1.0.0f:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:1.0.0g:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:1.0.0h:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:1.0.0i:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:1.0.0j:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:1.0.0k:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:1.0.0l:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:1.0.0m:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:1.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:1.0.1:beta1:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:1.0.1:beta2:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:1.0.1:beta3:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:1.0.1a:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:1.0.1b:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:1.0.1c:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:1.0.1d:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:1.0.1e:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:1.0.1f:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:1.0.1g:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:1.0.1h:*:*:*:*:*:*:*

  • Configuration RedHat 1:
  • cpe:/o:redhat:enterprise_linux:7:*:*:*:*:*:*:*

  • Configuration RedHat 2:
  • cpe:/o:redhat:enterprise_linux:6:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:openssl:openssl:1.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:openssl:openssl:1.0.1:*:*:*:*:*:*:*
  • AND
  • cpe:/a:ibm:rational_clearcase:7.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearquest:7.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearquest:7.1.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearquest:7.1.1.3:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearquest:7.1.1.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearquest:7.1.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearquest:7.1.2:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:6:*:server:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:6:*:workstation:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearcase:7.1.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearcase:7.1.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearcase:7.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearcase:7.1.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearcase:7.1.1.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearcase:7.1.1.3:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearcase:7.1.1.4:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearquest:7.1.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearquest:7.1.1.4:*:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:11.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearquest:8.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearquest:7.1.1.5:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearquest:7.1.1.6:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearquest:7.1.1.7:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearquest:7.1.1.8:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearquest:7.1.2.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearquest:7.1.2.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearquest:7.1.2.3:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearquest:7.1.2.4:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearquest:7.1.2.5:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearquest:8.0.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearquest:7.1.2.6:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearquest:7.1.2.7:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearquest:7.1.2.8:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearquest:8.0.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearquest:8.0.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearquest:8.0.0.4:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:sterling_b2b_integrator:5.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearquest:7.1.2.9:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearquest:8.0.0.5:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:sterling_b2b_integrator:5.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:sametime:8.5.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:sametime:8.5.2.1:*:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:12.1:*:*:*:*:*:*:*
  • OR cpe:/o:juniper:junos:13.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearcase:8.0.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearcase:8.0.0.4:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearcase:8.0.0.5:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearcase:8.0.0.6:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearcase:8.0.0.7:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearcase:8.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearquest:7.1.1.9:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearquest:7.1.2.10:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearquest:7.1.2.11:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearquest:8.0.0.6:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearquest:8.0.0.7:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearquest:8.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearcase:7.1.1.5:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearcase:7.1.1.6:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearcase:7.1.1.7:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearcase:7.1.1.8:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearcase:7.1.1.9:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearcase:7.1.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearcase:7.1.2.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearcase:7.1.2.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearcase:7.1.2.3:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearcase:7.1.2.4:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearcase:7.1.2.5:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearcase:7.1.2.6:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearcase:7.1.2.7:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearcase:7.1.2.9:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearcase:7.1.2.10:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearcase:7.1.2.11:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearcase:7.1.2.12:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearcase:8.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearcase:8.0.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearcase:8.0.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearcase:8.0.0.8:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearcase:8.0.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearquest:7.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearquest:7.1.2.12:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearquest:8.0.0.8:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearquest:8.0.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:pureapplication_system:1.0.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:sametime:9.0.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:sametime:9.0.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:messagesight_jms_client:1.1.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearcase:8.0.1.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearcase:8.0.0.9:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearquest:7.1.2.13:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearquest:7.1.2.14:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearquest:8.0.0.9:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearquest:8.0.0.10:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearquest:8.0.0.11:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearquest:8.0.1.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearquest:8.0.1.3:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearquest:8.0.1.4:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:worklight:6.1.0.1:*:*:*:consumer:*:*:*
  • OR cpe:/a:ibm:worklight:6.1.0.2::~~enterprise~~~:*:*:*:*:*
  • OR cpe:/a:ibm:worklight:6.2.0.1::~~enterprise~~~:*:*:*:*:*
  • OR cpe:/a:ibm:security_access_manager_for_mobile:8.0.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:security_access_manager_for_mobile:8.0.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:security_access_manager_for_mobile:8.0.0.4:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearcase:7.1.2.13:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearcase:8.0.0.10:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearcase:8.0.1.3:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearcase:7.1.2.14:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearcase:8.0.0.11:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearcase:8.0.1.4:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:pureapplication_system:1.0.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:pureapplication_system:1.0.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:pureapplication_system:1.0.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:pureapplication_system:1.0.0.4:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:pureapplication_system:1.1.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:pureapplication_system:1.1.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:pureapplication_system:1.1.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:pureapplication_system:1.1.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:pureapplication_system:1.1.0.4:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:security_access_manager_for_mobile:8.0.0.5:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearquest:8.0.0.12:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearquest:8.0.1.5:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearcase:8.0.0.12:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearcase:8.0.1.5:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:pureapplication_system:2.0.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearquest:7.1.2.15:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_clearcase:7.1.2.15:*:*:*:*:*:*:*
  • OR cpe:/h:ibm:integrated_management_module_ii:-:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:20143509
    V
    CVE-2014-3509
    2018-08-15
    oval:org.mitre.oval:def:27233
    P
    ELSA-2014-1052 -- openssl security update (moderate)
    2015-02-23
    oval:org.mitre.oval:def:26904
    V
    AIX OpenSSL Denial of Service due to memory overwrite
    2014-11-17
    oval:org.mitre.oval:def:26147
    V
    Vulnerability in OpenSSL 1.0.0 before 1.0.0n and 1.0.1 before 1.0.1i, allows remote SSL servers to cause a denial of service (memory overwrite and client application crash) or possibly have unspecified other impact by sending Elliptic Curve (EC) Supported Point Formats Extension data
    2014-10-13
    oval:org.mitre.oval:def:26426
    P
    RHSA-2014:1052: openssl security update (Moderate)
    2014-10-13
    oval:org.mitre.oval:def:26351
    P
    DSA-2998-1 openssl - security update
    2014-10-13
    oval:org.mitre.oval:def:26381
    P
    USN-2308-1 -- openssl vulnerabilities
    2014-10-13
    oval:com.redhat.rhsa:def:20141052
    P
    RHSA-2014:1052: openssl security update (Moderate)
    2014-08-13
    oval:com.ubuntu.precise:def:20143509000
    V
    CVE-2014-3509 on Ubuntu 12.04 LTS (precise) - medium.
    2014-08-13
    oval:com.ubuntu.trusty:def:20143509000
    V
    CVE-2014-3509 on Ubuntu 14.04 LTS (trusty) - medium.
    2014-08-13
    BACK
    openssl openssl 1.0.0
    openssl openssl 1.0.0 beta1
    openssl openssl 1.0.0 beta2
    openssl openssl 1.0.0 beta3
    openssl openssl 1.0.0 beta4
    openssl openssl 1.0.0 beta5
    openssl openssl 1.0.0a
    openssl openssl 1.0.0b
    openssl openssl 1.0.0c
    openssl openssl 1.0.0d
    openssl openssl 1.0.0e
    openssl openssl 1.0.0f
    openssl openssl 1.0.0g
    openssl openssl 1.0.0h
    openssl openssl 1.0.0i
    openssl openssl 1.0.0j
    openssl openssl 1.0.0k
    openssl openssl 1.0.0l
    openssl openssl 1.0.0m
    openssl openssl 1.0.1
    openssl openssl 1.0.1 beta1
    openssl openssl 1.0.1 beta2
    openssl openssl 1.0.1 beta3
    openssl openssl 1.0.1a
    openssl openssl 1.0.1b
    openssl openssl 1.0.1c
    openssl openssl 1.0.1d
    openssl openssl 1.0.1e
    openssl openssl 1.0.1f
    openssl openssl 1.0.1g
    openssl openssl 1.0.1h
    openssl openssl 1.0.0
    openssl openssl 1.0.1
    ibm rational clearcase 7.1
    ibm rational clearquest 7.1
    ibm rational clearquest 7.1.0.2
    ibm rational clearquest 7.1.1.3
    ibm rational clearquest 7.1.1.2
    ibm rational clearquest 7.1.1.1
    ibm rational clearquest 7.1.2
    redhat enterprise linux 6
    redhat enterprise linux 6
    ibm rational clearcase 7.1.0.1
    ibm rational clearcase 7.1.0.2
    ibm rational clearcase 7.1.1
    ibm rational clearcase 7.1.1.1
    ibm rational clearcase 7.1.1.2
    ibm rational clearcase 7.1.1.3
    ibm rational clearcase 7.1.1.4
    ibm rational clearquest 7.1.0.1
    ibm rational clearquest 7.1.1.4
    juniper junos 11.1
    ibm rational clearquest 8.0
    ibm rational clearquest 7.1.1.5
    ibm rational clearquest 7.1.1.6
    ibm rational clearquest 7.1.1.7
    ibm rational clearquest 7.1.1.8
    ibm rational clearquest 7.1.2.1
    ibm rational clearquest 7.1.2.2
    ibm rational clearquest 7.1.2.3
    ibm rational clearquest 7.1.2.4
    ibm rational clearquest 7.1.2.5
    ibm rational clearquest 8.0.0.1
    ibm rational clearquest 7.1.2.6
    ibm rational clearquest 7.1.2.7
    ibm rational clearquest 7.1.2.8
    ibm rational clearquest 8.0.0.2
    ibm rational clearquest 8.0.0.3
    ibm rational clearquest 8.0.0.4
    ibm sterling b2b integrator 5.1
    ibm rational clearquest 7.1.2.9
    ibm rational clearquest 8.0.0.5
    ibm sterling b2b integrator 5.2
    ibm sametime 8.5.2
    ibm sametime 8.5.2.1
    juniper junos 12.1
    juniper junos 13.1
    ibm rational clearcase 8.0.0.3
    ibm rational clearcase 8.0.0.4
    ibm rational clearcase 8.0.0.5
    ibm rational clearcase 8.0.0.6
    ibm rational clearcase 8.0.0.7
    ibm rational clearcase 8.0.1
    ibm rational clearquest 7.1.1.9
    ibm rational clearquest 7.1.2.10
    ibm rational clearquest 7.1.2.11
    ibm rational clearquest 8.0.0.6
    ibm rational clearquest 8.0.0.7
    ibm rational clearquest 8.0.1
    ibm rational clearcase 7.1.1.5
    ibm rational clearcase 7.1.1.6
    ibm rational clearcase 7.1.1.7
    ibm rational clearcase 7.1.1.8
    ibm rational clearcase 7.1.1.9
    ibm rational clearcase 7.1.2
    ibm rational clearcase 7.1.2.1
    ibm rational clearcase 7.1.2.2
    ibm rational clearcase 7.1.2.3
    ibm rational clearcase 7.1.2.4
    ibm rational clearcase 7.1.2.5
    ibm rational clearcase 7.1.2.6
    ibm rational clearcase 7.1.2.7
    ibm rational clearcase 7.1.2.9
    ibm rational clearcase 7.1.2.10
    ibm rational clearcase 7.1.2.11
    ibm rational clearcase 7.1.2.12
    ibm rational clearcase 8.0
    ibm rational clearcase 8.0.0.1
    ibm rational clearcase 8.0.0.2
    ibm rational clearcase 8.0.0.8
    ibm rational clearcase 8.0.1.1
    ibm rational clearquest 7.1.1
    ibm rational clearquest 7.1.2.12
    ibm rational clearquest 8.0.0.8
    ibm rational clearquest 8.0.1.1
    ibm pureapplication system 1.0.0.0
    ibm sametime 9.0.0.0
    ibm sametime 9.0.0.1
    ibm messagesight jms client 1.1.0.0
    ibm rational clearcase 8.0.1.2
    ibm rational clearcase 8.0.0.9
    ibm rational clearquest 7.1.2.13
    ibm rational clearquest 7.1.2.14
    ibm rational clearquest 8.0.0.9
    ibm rational clearquest 8.0.0.10
    ibm rational clearquest 8.0.0.11
    ibm rational clearquest 8.0.1.2
    ibm rational clearquest 8.0.1.3
    ibm rational clearquest 8.0.1.4
    ibm worklight 6.1.0.1
    ibm worklight 6.1.0.2
    ibm worklight 6.2.0.1
    ibm security access manager for mobile 8.0.0.1
    ibm security access manager for mobile 8.0.0.3
    ibm security access manager for mobile 8.0.0.4
    ibm rational clearcase 7.1.2.13
    ibm rational clearcase 8.0.0.10
    ibm rational clearcase 8.0.1.3
    ibm rational clearcase 7.1.2.14
    ibm rational clearcase 8.0.0.11
    ibm rational clearcase 8.0.1.4
    ibm pureapplication system 1.0.0.1
    ibm pureapplication system 1.0.0.2
    ibm pureapplication system 1.0.0.3
    ibm pureapplication system 1.0.0.4
    ibm pureapplication system 1.1.0.0
    ibm pureapplication system 1.1.0.1
    ibm pureapplication system 1.1.0.2
    ibm pureapplication system 1.1.0.3
    ibm pureapplication system 1.1.0.4
    ibm security access manager for mobile 8.0.0.5
    ibm rational clearquest 8.0.0.12
    ibm rational clearquest 8.0.1.5
    ibm rational clearcase 8.0.0.12
    ibm rational clearcase 8.0.1.5
    ibm pureapplication system 2.0.0.0
    ibm rational clearquest 7.1.2.15
    ibm rational clearcase 7.1.2.15
    ibm integrated management module ii -