The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before 1.0.1g do not properly handle Heartbeat Extension packets, which allows remote attackers to obtain sensitive information from process memory via crafted packets that trigger a buffer over-read, as demonstrated by reading private keys, related to d1_both.c and t1_lib.c, aka the Heartbleed bug.
Metrics
Affected Vendors & Products
References
History
Wed, 22 Oct 2025 01:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 21 Oct 2025 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 21 Oct 2025 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Fri, 07 Feb 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
kev
|
Tue, 13 Aug 2024 23:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Status: PUBLISHED
Assigner: redhat
Published: 2014-04-07T00:00:00.000Z
Updated: 2025-10-22T00:05:38.217Z
Reserved: 2013-12-03T00:00:00.000Z
Link: CVE-2014-0160
Updated: 2024-08-06T09:05:39.056Z
Status : Deferred
Published: 2014-04-07T22:55:03.893
Modified: 2025-10-22T01:15:53.233
Link: CVE-2014-0160