OpenSSL TLS/DTLS Heartbeat Information Disclosure Vulnerability
Publish Date: 21 de июля de 2015
Severity: : Medium
CVE Kennungen: : CVE-2014-0160
Advisory Date: 21 de июля de 2015
DESCRIPTION
The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before 1.0.1g do not properly handle Heartbeat Extension packets, which allow remote attackers to obtain sensitive information from process memory via crafted packets that trigger a buffer over-read, as demonstrated by reading private keys, related to d1_both.c and t1_lib.c, aka the Heartbleed bug.
INFORMATION EXPOSURE
Apply associated Trend Micro DPI Rules.
SOLUTION
Trend Micro Deep Security DPI Rule Number: 1006012
Trend Micro Deep Security DPI Rule Name: 1006012 - Identified Suspicious OpenSSL TLS/DTLS Heartbeat Request
AFFECTED SOFTWARE AND VERSION:
- openssl openssl 1.0.1
- openssl openssl 1.0.1a
- openssl openssl 1.0.1b
- openssl openssl 1.0.1c
- openssl openssl 1.0.1d
- openssl openssl 1.0.1e
- openssl openssl 1.0.1f
- openssl openssl 1.0.2