CVE-2014-0160
The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1

Publication date: 2014-04-07

Last updated on: 2025-04-03

Assigner: [email protected]

Description
The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before 1.0.1g do not properly handle Heartbeat Extension packets, which allows remote attackers to obtain sensitive information from process memory via crafted packets that trigger a buffer over-read, as demonstrated by reading private keys, related to d1_both.c and t1_lib.c, aka the Heartbleed bug.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Affected Vendors & Products
Vendor Product Version
openssl openssl From 1.0.1 (inc) to 1.0.1g (exc)
filezilla-project filezilla_server to 0.9.44 (exc)
siemens application_processing_engine_firmware *
siemens application_processing_engine *
siemens cp_1543-1_firmware *
siemens cp_1543-1 *
siemens simatic_s7-1500_firmware *
siemens simatic_s7-1500 *
siemens simatic_s7-1500t_firmware *
siemens simatic_s7-1500t *
siemens elan-8.2 to 8.3.3 (exc)
siemens wincc_open_architecture *
intellian v100_firmware *
intellian v100_firmware *
intellian v100_firmware *
intellian v100 *
intellian v60_firmware *
intellian v60_firmware *
intellian v60 *
mitel micollab *
mitel micollab *
mitel micollab *
mitel micollab *
mitel micollab *
mitel micollab *
mitel mivoice *
mitel mivoice *
mitel mivoice *
mitel mivoice *
mitel mivoice *
opensuse opensuse *
opensuse opensuse *
canonical ubuntu_linux *
canonical ubuntu_linux *
canonical ubuntu_linux *
fedoraproject fedora *
fedoraproject fedora *
redhat gluster_storage *
redhat storage *
redhat virtualization *
redhat enterprise_linux_desktop *
redhat enterprise_linux_server *
redhat enterprise_linux_server_aus *
redhat enterprise_linux_server_eus *
redhat enterprise_linux_server_tus *
redhat enterprise_linux_workstation *
debian debian_linux *
debian debian_linux *
debian debian_linux *
ricon s9922l_firmware *
ricon s9922l *
broadcom symantec_messaging_gateway *
broadcom symantec_messaging_gateway *
splunk splunk From 6.0.0 (inc) to 6.0.3 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-125 Out-of-bounds Read
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability impact me?


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?


Can you explain this vulnerability to me?


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
Meta Information
CVE Publication Date:
2014-04-07
CVE Last Modified Date:
2025-04-03
Report Generation Date:
2025-08-14
AI Powered Q&A Generation:
2024-11-28
EPSS Last Evaluated Date:
2025-07-02
NVD Report Link: