The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before 1.0.1g do not properly handle Heartbeat Extension packets, which allows remote attackers to obtain sensitive information from process memory via crafted packets that trigger a buffer over-read, as demonstrated by reading private keys, related to d1_both.c and t1_lib.c, aka the Heartbleed bug.
References
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: redhat
Published: 2014-04-07T00:00:00
Updated: 2022-11-15T00:00:00
Reserved: 2013-12-03T00:00:00
Link: CVE-2014-0160
JSON object: View
NVD Information
Status : Modified
Published: 2014-04-07T22:55:03.893
Modified: 2023-11-07T02:18:10.590
Link: CVE-2014-0160
JSON object: View
Redhat Information
No data.
CWE