CVE-2014-3566 : Detail

CVE-2014-3566

3.4
/
Low
A02-Cryptographic Failures
97.44%V3
Network
2014-10-14
22h00 +00:00
2024-11-27
19h31 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

The SSL protocol 3.0, as used in OpenSSL through 1.0.1i and other products, uses nondeterministic CBC padding, which makes it easier for man-in-the-middle attackers to obtain cleartext data via a padding-oracle attack, aka the "POODLE" issue.

CVE Informations

Related Weaknesses

CWE-ID Weakness Name Source
CWE-310 Category : Cryptographic Issues
Weaknesses in this category are related to the design and implementation of data confidentiality and integrity. Frequently these deal with the use of encoding techniques, encryption libraries, and hashing algorithms. The weaknesses in this category could lead to a degradation of the quality data if they are not addressed.

Metrics

Metrics Score Severity CVSS Vector Source
V3.1 3.4 LOW CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N

Base: Exploitabilty Metrics

The Exploitability metrics reflect the characteristics of the thing that is vulnerable, which we refer to formally as the vulnerable component.

Attack Vector

This metric reflects the context by which vulnerability exploitation is possible.

Network

The vulnerable component is bound to the network stack and the set of possible attackers extends beyond the other options listed below, up to and including the entire Internet. Such a vulnerability is often termed “remotely exploitable” and can be thought of as an attack being exploitable at the protocol level one or more network hops away (e.g., across one or more routers).

Attack Complexity

This metric describes the conditions beyond the attacker’s control that must exist in order to exploit the vulnerability.

High

successful attack depends on conditions beyond the attacker's control. That is, a successful attack cannot be accomplished at will, but requires the attacker to invest in some measurable amount of effort in preparation or execution against the vulnerable component before a successful attack can be expected.

Privileges Required

This metric describes the level of privileges an attacker must possess before successfully exploiting the vulnerability.

None

The attacker is unauthorized prior to attack, and therefore does not require any access to settings or files of the vulnerable system to carry out an attack.

User Interaction

This metric captures the requirement for a human user, other than the attacker, to participate in the successful compromise of the vulnerable component.

Required

Successful exploitation of this vulnerability requires a user to take some action before the vulnerability can be exploited. For example, a successful exploit may only be possible during the installation of an application by a system administrator.

Base: Scope Metrics

The Scope metric captures whether a vulnerability in one vulnerable component impacts resources in components beyond its security scope.

Scope

Formally, a security authority is a mechanism (e.g., an application, an operating system, firmware, a sandbox environment) that defines and enforces access control in terms of how certain subjects/actors (e.g., human users, processes) can access certain restricted objects/resources (e.g., files, CPU, memory) in a controlled manner. All the subjects and objects under the jurisdiction of a single security authority are considered to be under one security scope. If a vulnerability in a vulnerable component can affect a component which is in a different security scope than the vulnerable component, a Scope change occurs. Intuitively, whenever the impact of a vulnerability breaches a security/trust boundary and impacts components outside the security scope in which vulnerable component resides, a Scope change occurs.

Changed

An exploited vulnerability can affect resources beyond the security scope managed by the security authority of the vulnerable component. In this case, the vulnerable component and the impacted component are different and managed by different security authorities.

Base: Impact Metrics

The Impact metrics capture the effects of a successfully exploited vulnerability on the component that suffers the worst outcome that is most directly and predictably associated with the attack. Analysts should constrain impacts to a reasonable, final outcome which they are confident an attacker is able to achieve.

Confidentiality Impact

This metric measures the impact to the confidentiality of the information resources managed by a software component due to a successfully exploited vulnerability.

Low

There is some loss of confidentiality. Access to some restricted information is obtained, but the attacker does not have control over what information is obtained, or the amount or kind of loss is limited. The information disclosure does not cause a direct, serious loss to the impacted component.

Integrity Impact

This metric measures the impact to integrity of a successfully exploited vulnerability. Integrity refers to the trustworthiness and veracity of information.

None

There is no loss of integrity within the impacted component.

Availability Impact

This metric measures the impact to the availability of the impacted component resulting from a successfully exploited vulnerability.

None

There is no impact to availability within the impacted component.

Temporal Metrics

The Temporal metrics measure the current state of exploit techniques or code availability, the existence of any patches or workarounds, or the confidence in the description of a vulnerability.

Environmental Metrics

These metrics enable the analyst to customize the CVSS score depending on the importance of the affected IT asset to a user’s organization, measured in terms of Confidentiality, Integrity, and Availability.

[email protected]
V2 4.3 AV:N/AC:M/Au:N/C:P/I:N/A:N [email protected]

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Products Mentioned

Configuraton 0

Redhat>>Enterprise_linux >> Version 5

Redhat>>Enterprise_linux_desktop >> Version 6.0

Redhat>>Enterprise_linux_desktop >> Version 7.0

Redhat>>Enterprise_linux_desktop_supplementary >> Version 5.0

Redhat>>Enterprise_linux_desktop_supplementary >> Version 6.0

Redhat>>Enterprise_linux_server >> Version 6.0

Redhat>>Enterprise_linux_server >> Version 7.0

Redhat>>Enterprise_linux_server_supplementary >> Version 5.0

Redhat>>Enterprise_linux_server_supplementary >> Version 6.0

Redhat>>Enterprise_linux_server_supplementary >> Version 7.0

Redhat>>Enterprise_linux_workstation >> Version 6.0

Redhat>>Enterprise_linux_workstation >> Version 7.0

Redhat>>Enterprise_linux_workstation_supplementary >> Version 6.0

Redhat>>Enterprise_linux_workstation_supplementary >> Version 7.0

Configuraton 0

Ibm>>Aix >> Version 5.3

Ibm>>Aix >> Version 6.1

Ibm>>Aix >> Version 7.1

Configuraton 0

Apple>>Mac_os_x >> Version To (including) 10.10.1

Configuraton 0

Mageia>>Mageia >> Version 3.0

Mageia>>Mageia >> Version 4.0

Configuraton 0

Novell>>Suse_linux_enterprise_desktop >> Version 9.0

Novell>>Suse_linux_enterprise_desktop >> Version 10.0

Novell>>Suse_linux_enterprise_desktop >> Version 11.0

Novell>>Suse_linux_enterprise_desktop >> Version 12.0

Configuraton 0

Novell>>Suse_linux_enterprise_software_development_kit >> Version 11.0

Novell>>Suse_linux_enterprise_software_development_kit >> Version 12.0

Novell>>Suse_linux_enterprise_server >> Version 11.0

Novell>>Suse_linux_enterprise_server >> Version 11.0

Novell>>Suse_linux_enterprise_server >> Version 12.0

Opensuse>>Opensuse >> Version 12.3

Opensuse>>Opensuse >> Version 13.1

Configuraton 0

Fedoraproject>>Fedora >> Version 19

Fedoraproject>>Fedora >> Version 20

Fedoraproject>>Fedora >> Version 21

Configuraton 0

Openssl>>Openssl >> Version 0.9.8

Openssl>>Openssl >> Version 0.9.8a

Openssl>>Openssl >> Version 0.9.8b

Openssl>>Openssl >> Version 0.9.8c

Openssl>>Openssl >> Version 0.9.8d

Openssl>>Openssl >> Version 0.9.8e

Openssl>>Openssl >> Version 0.9.8f

Openssl>>Openssl >> Version 0.9.8g

Openssl>>Openssl >> Version 0.9.8h

Openssl>>Openssl >> Version 0.9.8i

Openssl>>Openssl >> Version 0.9.8j

Openssl>>Openssl >> Version 0.9.8k

Openssl>>Openssl >> Version 0.9.8l

Openssl>>Openssl >> Version 0.9.8m

Openssl>>Openssl >> Version 0.9.8m

Openssl>>Openssl >> Version 0.9.8n

Openssl>>Openssl >> Version 0.9.8o

Openssl>>Openssl >> Version 0.9.8p

Openssl>>Openssl >> Version 0.9.8q

Openssl>>Openssl >> Version 0.9.8r

Openssl>>Openssl >> Version 0.9.8s

Openssl>>Openssl >> Version 0.9.8t

Openssl>>Openssl >> Version 0.9.8u

Openssl>>Openssl >> Version 0.9.8v

Openssl>>Openssl >> Version 0.9.8w

Openssl>>Openssl >> Version 0.9.8x

Openssl>>Openssl >> Version 0.9.8y

Openssl>>Openssl >> Version 0.9.8z

Openssl>>Openssl >> Version 0.9.8za

Openssl>>Openssl >> Version 0.9.8zb

Openssl>>Openssl >> Version 1.0.0

Openssl>>Openssl >> Version 1.0.0

Openssl>>Openssl >> Version 1.0.0

Openssl>>Openssl >> Version 1.0.0

Openssl>>Openssl >> Version 1.0.0

Openssl>>Openssl >> Version 1.0.0

Openssl>>Openssl >> Version 1.0.0a

Openssl>>Openssl >> Version 1.0.0b

Openssl>>Openssl >> Version 1.0.0c

Openssl>>Openssl >> Version 1.0.0d

Openssl>>Openssl >> Version 1.0.0e

Openssl>>Openssl >> Version 1.0.0f

Openssl>>Openssl >> Version 1.0.0g

Openssl>>Openssl >> Version 1.0.0h

Openssl>>Openssl >> Version 1.0.0i

Openssl>>Openssl >> Version 1.0.0j

Openssl>>Openssl >> Version 1.0.0k

Openssl>>Openssl >> Version 1.0.0l

Openssl>>Openssl >> Version 1.0.0m

Openssl>>Openssl >> Version 1.0.0n

Openssl>>Openssl >> Version 1.0.1

Openssl>>Openssl >> Version 1.0.1

Openssl>>Openssl >> Version 1.0.1

Openssl>>Openssl >> Version 1.0.1

Openssl>>Openssl >> Version 1.0.1a

Openssl>>Openssl >> Version 1.0.1b

Openssl>>Openssl >> Version 1.0.1c

Openssl>>Openssl >> Version 1.0.1d

Openssl>>Openssl >> Version 1.0.1e

Openssl>>Openssl >> Version 1.0.1f

Openssl>>Openssl >> Version 1.0.1g

Openssl>>Openssl >> Version 1.0.1h

Openssl>>Openssl >> Version 1.0.1i

Configuraton 0

Ibm>>Vios >> Version 2.2.0.10

Ibm>>Vios >> Version 2.2.0.11

Ibm>>Vios >> Version 2.2.0.12

Ibm>>Vios >> Version 2.2.0.13

Ibm>>Vios >> Version 2.2.1.0

Ibm>>Vios >> Version 2.2.1.1

Ibm>>Vios >> Version 2.2.1.3

Ibm>>Vios >> Version 2.2.1.4

Ibm>>Vios >> Version 2.2.1.5

Ibm>>Vios >> Version 2.2.1.6

Ibm>>Vios >> Version 2.2.1.7

Ibm>>Vios >> Version 2.2.1.8

Ibm>>Vios >> Version 2.2.1.9

Ibm>>Vios >> Version 2.2.2.0

Ibm>>Vios >> Version 2.2.2.1

Ibm>>Vios >> Version 2.2.2.2

Ibm>>Vios >> Version 2.2.2.3

Ibm>>Vios >> Version 2.2.2.4

Ibm>>Vios >> Version 2.2.2.5

Ibm>>Vios >> Version 2.2.3.0

Ibm>>Vios >> Version 2.2.3.1

Ibm>>Vios >> Version 2.2.3.2

Ibm>>Vios >> Version 2.2.3.3

Ibm>>Vios >> Version 2.2.3.4

Configuraton 0

Netbsd>>Netbsd >> Version 5.1

Netbsd>>Netbsd >> Version 5.1.1

Netbsd>>Netbsd >> Version 5.1.2

Netbsd>>Netbsd >> Version 5.1.3

Netbsd>>Netbsd >> Version 5.1.4

Netbsd>>Netbsd >> Version 5.2

Netbsd>>Netbsd >> Version 5.2.1

Netbsd>>Netbsd >> Version 5.2.2

Netbsd>>Netbsd >> Version 6.0

Netbsd>>Netbsd >> Version 6.0

Netbsd>>Netbsd >> Version 6.0.1

Netbsd>>Netbsd >> Version 6.0.2

Netbsd>>Netbsd >> Version 6.0.3

Netbsd>>Netbsd >> Version 6.0.4

Netbsd>>Netbsd >> Version 6.0.5

Netbsd>>Netbsd >> Version 6.0.6

Netbsd>>Netbsd >> Version 6.1

Netbsd>>Netbsd >> Version 6.1.1

Netbsd>>Netbsd >> Version 6.1.2

Netbsd>>Netbsd >> Version 6.1.3

Netbsd>>Netbsd >> Version 6.1.4

Netbsd>>Netbsd >> Version 6.1.5

Configuraton 0

Debian>>Debian_linux >> Version 7.0

Debian>>Debian_linux >> Version 8.0

Configuraton 0

Oracle>>Database >> Version 11.2.0.4

Oracle>>Database >> Version 12.1.0.2

References

http://marc.info/?l=bugtraq&m=142103967620673&w=2
Tags : vendor-advisory, x_refsource_HP
http://www.securitytracker.com/id/1031090
Tags : vdb-entry, x_refsource_SECTRACK
http://rhn.redhat.com/errata/RHSA-2014-1880.html
Tags : vendor-advisory, x_refsource_REDHAT
http://marc.info/?l=bugtraq&m=142804214608580&w=2
Tags : vendor-advisory, x_refsource_HP
http://www.kb.cert.org/vuls/id/577193
Tags : third-party-advisory, x_refsource_CERT-VN
http://marc.info/?l=bugtraq&m=141577087123040&w=2
Tags : vendor-advisory, x_refsource_HP
http://marc.info/?l=bugtraq&m=141715130023061&w=2
Tags : vendor-advisory, x_refsource_HP
https://support.apple.com/kb/HT6542
Tags : x_refsource_CONFIRM
http://www.securitytracker.com/id/1031106
Tags : vdb-entry, x_refsource_SECTRACK
http://marc.info/?l=bugtraq&m=141697638231025&w=2
Tags : vendor-advisory, x_refsource_HP
http://marc.info/?l=openssl-dev&m=141333049205629&w=2
Tags : mailing-list, x_refsource_MLIST
http://marc.info/?l=bugtraq&m=142350298616097&w=2
Tags : vendor-advisory, x_refsource_HP
http://marc.info/?l=bugtraq&m=142350743917559&w=2
Tags : vendor-advisory, x_refsource_HP
http://secunia.com/advisories/60056
Tags : third-party-advisory, x_refsource_SECUNIA
http://rhn.redhat.com/errata/RHSA-2014-1877.html
Tags : vendor-advisory, x_refsource_REDHAT
http://marc.info/?l=bugtraq&m=141477196830952&w=2
Tags : vendor-advisory, x_refsource_HP
http://secunia.com/advisories/61130
Tags : third-party-advisory, x_refsource_SECUNIA
http://rhn.redhat.com/errata/RHSA-2015-1546.html
Tags : vendor-advisory, x_refsource_REDHAT
https://support.apple.com/kb/HT6529
Tags : x_refsource_CONFIRM
http://rhn.redhat.com/errata/RHSA-2014-1920.html
Tags : vendor-advisory, x_refsource_REDHAT
http://www.securitytracker.com/id/1031087
Tags : vdb-entry, x_refsource_SECTRACK
http://marc.info/?l=bugtraq&m=143628269912142&w=2
Tags : vendor-advisory, x_refsource_HP
http://marc.info/?l=bugtraq&m=141879378918327&w=2
Tags : vendor-advisory, x_refsource_HP
http://secunia.com/advisories/61359
Tags : third-party-advisory, x_refsource_SECUNIA
https://support.apple.com/kb/HT6541
Tags : x_refsource_CONFIRM
http://www.securitytracker.com/id/1031093
Tags : vdb-entry, x_refsource_SECTRACK
http://www.securitytracker.com/id/1031132
Tags : vdb-entry, x_refsource_SECTRACK
http://www.debian.org/security/2015/dsa-3144
Tags : vendor-advisory, x_refsource_DEBIAN
http://marc.info/?l=bugtraq&m=142721887231400&w=2
Tags : vendor-advisory, x_refsource_HP
http://www.debian.org/security/2015/dsa-3253
Tags : vendor-advisory, x_refsource_DEBIAN
http://marc.info/?l=bugtraq&m=142660345230545&w=2
Tags : vendor-advisory, x_refsource_HP
http://www.securityfocus.com/archive/1/533724/100/0/threaded
Tags : vendor-advisory, x_refsource_APPLE
http://marc.info/?l=bugtraq&m=142296755107581&w=2
Tags : vendor-advisory, x_refsource_HP
http://marc.info/?l=bugtraq&m=142805027510172&w=2
Tags : vendor-advisory, x_refsource_HP
http://secunia.com/advisories/61827
Tags : third-party-advisory, x_refsource_SECUNIA
http://marc.info/?l=bugtraq&m=141450452204552&w=2
Tags : vendor-advisory, x_refsource_HP
http://rhn.redhat.com/errata/RHSA-2015-0079.html
Tags : vendor-advisory, x_refsource_REDHAT
http://marc.info/?l=bugtraq&m=142791032306609&w=2
Tags : vendor-advisory, x_refsource_HP
http://rhn.redhat.com/errata/RHSA-2015-1545.html
Tags : vendor-advisory, x_refsource_REDHAT
http://marc.info/?l=bugtraq&m=142624619906067&w=2
Tags : vendor-advisory, x_refsource_HP
http://www.securitytracker.com/id/1031094
Tags : vdb-entry, x_refsource_SECTRACK
http://secunia.com/advisories/61316
Tags : third-party-advisory, x_refsource_SECUNIA
https://security.gentoo.org/glsa/201606-11
Tags : vendor-advisory, x_refsource_GENTOO
http://rhn.redhat.com/errata/RHSA-2014-1881.html
Tags : vendor-advisory, x_refsource_REDHAT
http://www.securitytracker.com/id/1031096
Tags : vdb-entry, x_refsource_SECTRACK
http://marc.info/?l=bugtraq&m=142721887231400&w=2
Tags : vendor-advisory, x_refsource_HP
http://secunia.com/advisories/61810
Tags : third-party-advisory, x_refsource_SECUNIA
http://marc.info/?l=bugtraq&m=142660345230545&w=2
Tags : vendor-advisory, x_refsource_HP
http://www.debian.org/security/2014/dsa-3053
Tags : vendor-advisory, x_refsource_DEBIAN
http://marc.info/?l=bugtraq&m=142296755107581&w=2
Tags : vendor-advisory, x_refsource_HP
http://www.securitytracker.com/id/1031107
Tags : vdb-entry, x_refsource_SECTRACK
http://www.securitytracker.com/id/1031095
Tags : vdb-entry, x_refsource_SECTRACK
http://marc.info/?l=bugtraq&m=143290583027876&w=2
Tags : vendor-advisory, x_refsource_HP
http://marc.info/?l=bugtraq&m=142962817202793&w=2
Tags : vendor-advisory, x_refsource_HP
http://marc.info/?l=bugtraq&m=143101048219218&w=2
Tags : vendor-advisory, x_refsource_HP
http://marc.info/?l=bugtraq&m=142118135300698&w=2
Tags : vendor-advisory, x_refsource_HP
http://www.securitytracker.com/id/1031091
Tags : vdb-entry, x_refsource_SECTRACK
http://marc.info/?l=bugtraq&m=142495837901899&w=2
Tags : vendor-advisory, x_refsource_HP
http://www.securitytracker.com/id/1031123
Tags : vdb-entry, x_refsource_SECTRACK
https://support.apple.com/HT205217
Tags : x_refsource_CONFIRM
http://www.securitytracker.com/id/1031092
Tags : vdb-entry, x_refsource_SECTRACK
http://secunia.com/advisories/61926
Tags : third-party-advisory, x_refsource_SECUNIA
http://rhn.redhat.com/errata/RHSA-2014-1876.html
Tags : vendor-advisory, x_refsource_REDHAT
http://marc.info/?l=bugtraq&m=142103967620673&w=2
Tags : vendor-advisory, x_refsource_HP
http://marc.info/?l=bugtraq&m=141450973807288&w=2
Tags : vendor-advisory, x_refsource_HP
http://marc.info/?l=bugtraq&m=141814011518700&w=2
Tags : vendor-advisory, x_refsource_HP
http://marc.info/?l=bugtraq&m=145983526810210&w=2
Tags : vendor-advisory, x_refsource_HP
https://support.apple.com/kb/HT6531
Tags : x_refsource_CONFIRM
http://rhn.redhat.com/errata/RHSA-2015-0264.html
Tags : vendor-advisory, x_refsource_REDHAT
https://support.apple.com/kb/HT6527
Tags : x_refsource_CONFIRM
http://marc.info/?l=bugtraq&m=142350196615714&w=2
Tags : vendor-advisory, x_refsource_HP
http://marc.info/?l=bugtraq&m=141697676231104&w=2
Tags : vendor-advisory, x_refsource_HP
http://secunia.com/advisories/60206
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/60792
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.debian.org/security/2016/dsa-3489
Tags : vendor-advisory, x_refsource_DEBIAN
http://www.securitytracker.com/id/1031105
Tags : vdb-entry, x_refsource_SECTRACK
http://www.securitytracker.com/id/1031131
Tags : vdb-entry, x_refsource_SECTRACK
http://marc.info/?l=bugtraq&m=141879378918327&w=2
Tags : vendor-advisory, x_refsource_HP
http://www.ubuntu.com/usn/USN-2487-1
Tags : vendor-advisory, x_refsource_UBUNTU
http://marc.info/?l=bugtraq&m=142740155824959&w=2
Tags : vendor-advisory, x_refsource_HP
http://marc.info/?l=bugtraq&m=141813976718456&w=2
Tags : vendor-advisory, x_refsource_HP
http://www.securitytracker.com/id/1031130
Tags : vdb-entry, x_refsource_SECTRACK
http://marc.info/?l=bugtraq&m=142721830231196&w=2
Tags : vendor-advisory, x_refsource_HP
http://marc.info/?l=bugtraq&m=141577350823734&w=2
Tags : vendor-advisory, x_refsource_HP
http://rhn.redhat.com/errata/RHSA-2014-1948.html
Tags : vendor-advisory, x_refsource_REDHAT
http://marc.info/?l=bugtraq&m=141620103726640&w=2
Tags : vendor-advisory, x_refsource_HP
http://rhn.redhat.com/errata/RHSA-2014-1653.html
Tags : vendor-advisory, x_refsource_REDHAT
http://marc.info/?l=bugtraq&m=144101915224472&w=2
Tags : vendor-advisory, x_refsource_HP
http://support.apple.com/HT204244
Tags : x_refsource_CONFIRM
http://marc.info/?l=bugtraq&m=142624679706236&w=2
Tags : vendor-advisory, x_refsource_HP
http://rhn.redhat.com/errata/RHSA-2015-0085.html
Tags : vendor-advisory, x_refsource_REDHAT
https://support.apple.com/kb/HT6536
Tags : x_refsource_CONFIRM
http://marc.info/?l=bugtraq&m=141576815022399&w=2
Tags : vendor-advisory, x_refsource_HP
http://marc.info/?l=bugtraq&m=141477196830952&w=2
Tags : vendor-advisory, x_refsource_HP
http://marc.info/?l=bugtraq&m=143290371927178&w=2
Tags : vendor-advisory, x_refsource_HP
http://rhn.redhat.com/errata/RHSA-2014-1652.html
Tags : vendor-advisory, x_refsource_REDHAT
https://support.apple.com/kb/HT6535
Tags : x_refsource_CONFIRM
http://marc.info/?l=bugtraq&m=142546741516006&w=2
Tags : vendor-advisory, x_refsource_HP
http://rhn.redhat.com/errata/RHSA-2015-0086.html
Tags : vendor-advisory, x_refsource_REDHAT
http://marc.info/?l=bugtraq&m=143039249603103&w=2
Tags : vendor-advisory, x_refsource_HP
http://www.securitytracker.com/id/1031124
Tags : vdb-entry, x_refsource_SECTRACK
http://rhn.redhat.com/errata/RHSA-2015-0080.html
Tags : vendor-advisory, x_refsource_REDHAT
http://marc.info/?l=bugtraq&m=142740155824959&w=2
Tags : vendor-advisory, x_refsource_HP
http://rhn.redhat.com/errata/RHSA-2014-1882.html
Tags : vendor-advisory, x_refsource_REDHAT
http://rhn.redhat.com/errata/RHSA-2015-0068.html
Tags : vendor-advisory, x_refsource_REDHAT
http://marc.info/?l=bugtraq&m=142354438527235&w=2
Tags : vendor-advisory, x_refsource_HP
http://www.ubuntu.com/usn/USN-2486-1
Tags : vendor-advisory, x_refsource_UBUNTU
http://marc.info/?l=bugtraq&m=144294141001552&w=2
Tags : vendor-advisory, x_refsource_HP
http://secunia.com/advisories/59627
Tags : third-party-advisory, x_refsource_SECUNIA
http://marc.info/?l=bugtraq&m=141814011518700&w=2
Tags : vendor-advisory, x_refsource_HP
http://marc.info/?l=bugtraq&m=142495837901899&w=2
Tags : vendor-advisory, x_refsource_HP
http://marc.info/?l=bugtraq&m=141694355519663&w=2
Tags : vendor-advisory, x_refsource_HP
http://marc.info/?l=bugtraq&m=143290437727362&w=2
Tags : vendor-advisory, x_refsource_HP
http://marc.info/?l=bugtraq&m=142350298616097&w=2
Tags : vendor-advisory, x_refsource_HP
http://marc.info/?l=bugtraq&m=141775427104070&w=2
Tags : vendor-advisory, x_refsource_HP
http://rhn.redhat.com/errata/RHSA-2015-0698.html
Tags : vendor-advisory, x_refsource_REDHAT
http://secunia.com/advisories/60859
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.securityfocus.com/archive/1/533746
Tags : vendor-advisory, x_refsource_APPLE
https://security.gentoo.org/glsa/201507-14
Tags : vendor-advisory, x_refsource_GENTOO
http://marc.info/?l=bugtraq&m=142624719706349&w=2
Tags : vendor-advisory, x_refsource_HP
http://marc.info/?l=bugtraq&m=142496355704097&w=2
Tags : vendor-advisory, x_refsource_HP
http://secunia.com/advisories/61345
Tags : third-party-advisory, x_refsource_SECUNIA
http://marc.info/?l=bugtraq&m=143101048219218&w=2
Tags : vendor-advisory, x_refsource_HP
http://secunia.com/advisories/61019
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.securityfocus.com/bid/70574
Tags : vdb-entry, x_refsource_BID
http://www.securitytracker.com/id/1031120
Tags : vdb-entry, x_refsource_SECTRACK
http://secunia.com/advisories/61825
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.securitytracker.com/id/1031029
Tags : vdb-entry, x_refsource_SECTRACK
http://marc.info/?l=bugtraq&m=142624719706349&w=2
Tags : vendor-advisory, x_refsource_HP
http://marc.info/?l=bugtraq&m=142624590206005&w=2
Tags : vendor-advisory, x_refsource_HP
http://marc.info/?l=bugtraq&m=143290522027658&w=2
Tags : vendor-advisory, x_refsource_HP
http://secunia.com/advisories/61782
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.mandriva.com/security/advisories?name=MDVSA-2015:062
Tags : vendor-advisory, x_refsource_MANDRIVA
http://www.securitytracker.com/id/1031085
Tags : vdb-entry, x_refsource_SECTRACK
http://marc.info/?l=bugtraq&m=144251162130364&w=2
Tags : vendor-advisory, x_refsource_HP
http://marc.info/?l=bugtraq&m=143039249603103&w=2
Tags : vendor-advisory, x_refsource_HP
http://www.securityfocus.com/archive/1/533747
Tags : vendor-advisory, x_refsource_APPLE
http://marc.info/?l=bugtraq&m=142118135300698&w=2
Tags : vendor-advisory, x_refsource_HP
http://marc.info/?l=bugtraq&m=142624679706236&w=2
Tags : vendor-advisory, x_refsource_HP
http://www.mandriva.com/security/advisories?name=MDVSA-2014:203
Tags : vendor-advisory, x_refsource_MANDRIVA
http://marc.info/?l=bugtraq&m=142118135300698&w=2
Tags : vendor-advisory, x_refsource_HP
http://marc.info/?l=bugtraq&m=142607790919348&w=2
Tags : vendor-advisory, x_refsource_HP
http://marc.info/?l=bugtraq&m=142354438527235&w=2
Tags : vendor-advisory, x_refsource_HP
http://secunia.com/advisories/61303
Tags : third-party-advisory, x_refsource_SECUNIA
http://marc.info/?l=bugtraq&m=142350743917559&w=2
Tags : vendor-advisory, x_refsource_HP
http://marc.info/?l=bugtraq&m=142496355704097&w=2
Tags : vendor-advisory, x_refsource_HP
http://www.securitytracker.com/id/1031039
Tags : vdb-entry, x_refsource_SECTRACK
http://marc.info/?l=bugtraq&m=142721830231196&w=2
Tags : vendor-advisory, x_refsource_HP
http://marc.info/?l=bugtraq&m=142624619906067
Tags : vendor-advisory, x_refsource_HP
http://www.securitytracker.com/id/1031089
Tags : vdb-entry, x_refsource_SECTRACK
http://marc.info/?l=bugtraq&m=142350196615714&w=2
Tags : vendor-advisory, x_refsource_HP
http://marc.info/?l=bugtraq&m=141628688425177&w=2
Tags : vendor-advisory, x_refsource_HP
http://www.us-cert.gov/ncas/alerts/TA14-290A
Tags : third-party-advisory, x_refsource_CERT
http://secunia.com/advisories/61819
Tags : third-party-advisory, x_refsource_SECUNIA
http://marc.info/?l=bugtraq&m=142357976805598&w=2
Tags : vendor-advisory, x_refsource_HP
http://www.securitytracker.com/id/1031088
Tags : vdb-entry, x_refsource_SECTRACK
http://www.debian.org/security/2015/dsa-3147
Tags : vendor-advisory, x_refsource_DEBIAN
http://secunia.com/advisories/61995
Tags : third-party-advisory, x_refsource_SECUNIA
http://marc.info/?l=bugtraq&m=141703183219781&w=2
Tags : vendor-advisory, x_refsource_HP
http://marc.info/?l=bugtraq&m=142357976805598&w=2
Tags : vendor-advisory, x_refsource_HP
http://www.securitytracker.com/id/1031086
Tags : vdb-entry, x_refsource_SECTRACK
http://marc.info/?l=bugtraq&m=143558192010071&w=2
Tags : vendor-advisory, x_refsource_HP
http://rhn.redhat.com/errata/RHSA-2014-1692.html
Tags : vendor-advisory, x_refsource_REDHAT
http://marc.info/?l=bugtraq&m=143558137709884&w=2
Tags : vendor-advisory, x_refsource_HP