<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Response to &amp;quot;Heartbleed&amp;quot; CVE-2014-0160 OpenSSL vulnerability in FAQs</title>
    <link>https://community.extremenetworks.com/t5/faqs/response-to-quot-heartbleed-quot-cve-2014-0160-openssl/m-p/43468#M176</link>
    <description>Article ID: 16130 &lt;BR /&gt;
&lt;BR /&gt;
&lt;B&gt;Products&lt;/B&gt;&lt;BR /&gt;
The issue affects products which use OpenSSL 1.0.1 (March 2012) through 1.0.1f for SSL/HTTPS support.&lt;BR /&gt;
OpenSSL 1.0.1g, released April 7 2014, resolves the vulnerability.&lt;BR /&gt;
&lt;BR /&gt;
Affected:&lt;UL&gt; 
&lt;LI&gt;Black Diamond Series X8, 8900, and 8800 running EXOS version 15.4.1 
&lt;/LI&gt;&lt;LI&gt;Summit Series X770, X670, X480, X460, X440, X430, E4G-200, and E4G-400 running EXOS version 15.4.1 
&lt;/LI&gt;&lt;LI&gt;64-bit (Ubuntu) hardware-based and virtual NetSight appliances running version 4.4, 5.0, 5.1, or 6.0 
&lt;/LI&gt;&lt;LI&gt;64-bit (Ubuntu) hardware-based and virtual NAC &amp;amp; IA appliances running version 5.0, 5.1, or 6.0 
&lt;/LI&gt;&lt;LI&gt;64-bit (Ubuntu) hardware-based and virtual Purview appliances running version 6.0&lt;/LI&gt;&lt;/UL&gt;&lt;B&gt;Discussion&lt;/B&gt;&lt;BR /&gt;
Vulnerability notification &lt;A href="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-0160" target="_blank" rel="nofollow noreferrer noopener"&gt;CVE-2014-0160&lt;/A&gt; was released on April 7 2014.&lt;BR /&gt;
Its Overview states:&lt;BR /&gt;
&lt;DIV class="threadCode"&gt;&lt;B&gt;code:&lt;/B&gt;&lt;PRE spellcheck="false"&gt;The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before 1.0.1g do not properly handle Heartbeat Extension packets, which allows remote attackers to obtain sensitive information from process memory via crafted packets that trigger a buffer over-read, as demonstrated by reading private keys, related to d1_both.c and t1_lib.c, aka the Heartbleed bug.&lt;/PRE&gt;&lt;/DIV&gt;&lt;BR /&gt;
&lt;BR /&gt;
The high visibility and potentially high impact of this issue has spawned many follow-up reports which are visible in a web search for "&lt;DIV class="threadCode"&gt;&lt;B&gt;code:&lt;/B&gt;&lt;PRE spellcheck="false"&gt;heartbleed&lt;/PRE&gt;&lt;/DIV&gt;" or "&lt;DIV class="threadCode"&gt;&lt;B&gt;code:&lt;/B&gt;&lt;PRE spellcheck="false"&gt;CVE-2014-0160&lt;/PRE&gt;&lt;/DIV&gt;".&lt;BR /&gt;
&lt;BR /&gt;
Patches have been developed to address this vulnerability across all affected products, and these will be included in subsequent GA releases. Patch availability is discussed in &lt;A href="http://bit.ly/1n6cUcI" target="_blank" rel="nofollow noreferrer noopener"&gt;16131&lt;/A&gt;, which addresses this issue being tracked as US-CERT Vulnerability Advisory VU#720951.</description>
    <pubDate>Mon, 14 Apr 2014 18:09:00 GMT</pubDate>
    <dc:creator>FAQ_User</dc:creator>
    <dc:date>2014-04-14T18:09:00Z</dc:date>
    <item>
      <title>Response to "Heartbleed" CVE-2014-0160 OpenSSL vulnerability</title>
      <link>https://community.extremenetworks.com/t5/faqs/response-to-quot-heartbleed-quot-cve-2014-0160-openssl/m-p/43468#M176</link>
      <description>Article ID: 16130 &lt;BR /&gt;
&lt;BR /&gt;
&lt;B&gt;Products&lt;/B&gt;&lt;BR /&gt;
The issue affects products which use OpenSSL 1.0.1 (March 2012) through 1.0.1f for SSL/HTTPS support.&lt;BR /&gt;
OpenSSL 1.0.1g, released April 7 2014, resolves the vulnerability.&lt;BR /&gt;
&lt;BR /&gt;
Affected:&lt;UL&gt; 
&lt;LI&gt;Black Diamond Series X8, 8900, and 8800 running EXOS version 15.4.1 
&lt;/LI&gt;&lt;LI&gt;Summit Series X770, X670, X480, X460, X440, X430, E4G-200, and E4G-400 running EXOS version 15.4.1 
&lt;/LI&gt;&lt;LI&gt;64-bit (Ubuntu) hardware-based and virtual NetSight appliances running version 4.4, 5.0, 5.1, or 6.0 
&lt;/LI&gt;&lt;LI&gt;64-bit (Ubuntu) hardware-based and virtual NAC &amp;amp; IA appliances running version 5.0, 5.1, or 6.0 
&lt;/LI&gt;&lt;LI&gt;64-bit (Ubuntu) hardware-based and virtual Purview appliances running version 6.0&lt;/LI&gt;&lt;/UL&gt;&lt;B&gt;Discussion&lt;/B&gt;&lt;BR /&gt;
Vulnerability notification &lt;A href="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-0160" target="_blank" rel="nofollow noreferrer noopener"&gt;CVE-2014-0160&lt;/A&gt; was released on April 7 2014.&lt;BR /&gt;
Its Overview states:&lt;BR /&gt;
&lt;DIV class="threadCode"&gt;&lt;B&gt;code:&lt;/B&gt;&lt;PRE spellcheck="false"&gt;The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before 1.0.1g do not properly handle Heartbeat Extension packets, which allows remote attackers to obtain sensitive information from process memory via crafted packets that trigger a buffer over-read, as demonstrated by reading private keys, related to d1_both.c and t1_lib.c, aka the Heartbleed bug.&lt;/PRE&gt;&lt;/DIV&gt;&lt;BR /&gt;
&lt;BR /&gt;
The high visibility and potentially high impact of this issue has spawned many follow-up reports which are visible in a web search for "&lt;DIV class="threadCode"&gt;&lt;B&gt;code:&lt;/B&gt;&lt;PRE spellcheck="false"&gt;heartbleed&lt;/PRE&gt;&lt;/DIV&gt;" or "&lt;DIV class="threadCode"&gt;&lt;B&gt;code:&lt;/B&gt;&lt;PRE spellcheck="false"&gt;CVE-2014-0160&lt;/PRE&gt;&lt;/DIV&gt;".&lt;BR /&gt;
&lt;BR /&gt;
Patches have been developed to address this vulnerability across all affected products, and these will be included in subsequent GA releases. Patch availability is discussed in &lt;A href="http://bit.ly/1n6cUcI" target="_blank" rel="nofollow noreferrer noopener"&gt;16131&lt;/A&gt;, which addresses this issue being tracked as US-CERT Vulnerability Advisory VU#720951.</description>
      <pubDate>Mon, 14 Apr 2014 18:09:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/faqs/response-to-quot-heartbleed-quot-cve-2014-0160-openssl/m-p/43468#M176</guid>
      <dc:creator>FAQ_User</dc:creator>
      <dc:date>2014-04-14T18:09:00Z</dc:date>
    </item>
  </channel>
</rss>

