OpenSSL TLS/DTLS Heartbeat Information Disclosure Vulnerability
Publish Date: 21 juillet 2015
Gravité: : Medium
Identifiant(s) CVE: : CVE-2014-0160
Date du conseil: 21 juillet 2015
Description
The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before 1.0.1g do not properly handle Heartbeat Extension packets, which allow remote attackers to obtain sensitive information from process memory via crafted packets that trigger a buffer over-read, as demonstrated by reading private keys, related to d1_both.c and t1_lib.c, aka the Heartbleed bug.
Information Exposure Rating:
Apply associated Trend Micro DPI Rules.
Solutions
Trend Micro Deep Security DPI Rule Number: 1006012
Trend Micro Deep Security DPI Rule Name: 1006012 - Identified Suspicious OpenSSL TLS/DTLS Heartbeat Request
Affected software and version:
- openssl openssl 1.0.1
- openssl openssl 1.0.1a
- openssl openssl 1.0.1b
- openssl openssl 1.0.1c
- openssl openssl 1.0.1d
- openssl openssl 1.0.1e
- openssl openssl 1.0.1f
- openssl openssl 1.0.2