Versio.io

CVE-2014-3566

Common vulnerabilities & exposures (CVE)

CVE databaseCVE database blogpostRelease & EoL database
 
Published at: - 14-10-2014 02:00
Last modified: - 14-10-2014 02:00
Total changes: - 221

Description

CVE-2014-3566 SSL/TLS: Padding Oracle On Downgraded Legacy Encryption attack

Common Vulnerability Scoring System (CVSS)

AV:N/AC:L/Au:N/C:P/I:N/A:N
Low
Attack complexity
Network
Attack vector
None
Availability
Low
Confidentiality
None
Integrity
-
Privileges required
-
Scope
-
User interaction
5.0
Base score
Exploitability score
Impact score
 

Verification logic

OR
AND
product=java-1.7.0-oracle-1 AND versionEndExcluding=1.7.0.75-1jpp.1.el5_11
vendor=Red Hat Enterprise Linux AND product=rhel_extras_oracle_java AND version=5
AND
product=java-1.6.0-sun-1 AND versionEndExcluding=1.6.0.91-1jpp.1.el5_11
vendor=Red Hat Enterprise Linux AND product=rhel_extras_oracle_java AND version=5
AND
product=java-1.7.0-oracle-1 AND versionEndExcluding=1.7.0.75-1jpp.1.el6
vendor=Red Hat Enterprise Linux AND product=rhel_extras_oracle_java AND version=6
AND
product=java-1.8.0-oracle-1 AND versionEndExcluding=1.8.0.31-1jpp.1.el6
vendor=Red Hat Enterprise Linux AND product=rhel_extras_oracle_java AND version=6
AND
product=java-1.6.0-sun-1 AND versionEndExcluding=1.6.0.91-1jpp.1.el6
vendor=Red Hat Enterprise Linux AND product=rhel_extras_oracle_java AND version=6
AND
product=java-1.7.0-oracle-1 AND versionEndExcluding=1.7.0.75-1jpp.2.el7
vendor=Red Hat Enterprise Linux AND product=rhel_extras_oracle_java AND version=7
AND
product=java-1.6.0-sun-1 AND versionEndExcluding=1.6.0.91-1jpp.1.el7
vendor=Red Hat Enterprise Linux AND product=rhel_extras_oracle_java AND version=7
AND
product=java-1.7.0-openjdk-1 AND versionEndExcluding=1.7.0.75-2.5.4.0.el5_11
vendor=Red Hat Enterprise Linux AND product=enterprise_linux AND version=5
AND
product=java-1.6.0-openjdk-1 AND versionEndExcluding=1.6.0.34-1.13.6.1.el5_11
vendor=Red Hat Enterprise Linux AND product=enterprise_linux AND version=5
AND
product=java-1.7.0-ibm-1 AND versionEndExcluding=1.7.0.8.0-1jpp.1.el5
vendor=Red Hat Enterprise Linux AND product=rhel_extras AND version=5
AND
product=java-1.6.0-ibm-1 AND versionEndExcluding=1.6.0.16.2-1jpp.1.el5
vendor=Red Hat Enterprise Linux AND product=rhel_extras AND version=5
AND
product=java-1.5.0-ibm-1 AND versionEndExcluding=1.5.0.16.8-1jpp.1.el5
vendor=Red Hat Enterprise Linux AND product=rhel_extras AND version=5
AND
product=java-1.7.0-openjdk-1 AND versionEndExcluding=1.7.0.75-2.5.4.0.el6_6
vendor=Red Hat Enterprise Linux AND product=enterprise_linux AND version=6
AND
product=java-1.8.0-openjdk-1 AND versionEndExcluding=1.8.0.31-1.b13.el6_6
vendor=Red Hat Enterprise Linux AND product=enterprise_linux AND version=6
AND
product=java-1.6.0-openjdk-1 AND versionEndExcluding=1.6.0.34-1.13.6.1.el6_6
vendor=Red Hat Enterprise Linux AND product=enterprise_linux AND version=6
AND
product=java-1.7.0-openjdk-1 AND versionEndExcluding=1.7.0.75-2.5.4.2.el7_0
vendor=Red Hat Enterprise Linux AND product=enterprise_linux AND version=7
AND
product=java-1.6.0-openjdk-1 AND versionEndExcluding=1.6.0.34-1.13.6.1.el7_0
vendor=Red Hat Enterprise Linux AND product=enterprise_linux AND version=7
AND
vendor=Red Hat Enterprise Linux AND product=jboss_enterprise_application_platform AND version=5.2.0
AND
product=openssl
vendor=Red Hat Enterprise Linux AND product=jboss_enterprise_application_platform AND version=6.3
AND
vendor=Red Hat Enterprise Linux AND product=jboss_enterprise_web_platform AND version=5.2.0
AND
product=openssl
vendor=Red Hat Enterprise Linux AND product=jboss_enterprise_web_server AND version=2.1
AND
product=openshift-origin-node-proxy-0 AND versionEndExcluding=1.16.4.2-1.el6op
vendor=Red Hat Enterprise Linux AND product=openshift AND version=2.0
AND
product=openshift-origin-node-proxy-0 AND versionEndExcluding=1.22.3.4-1.el6op
vendor=Red Hat Enterprise Linux AND product=openshift AND version=2.0
AND
product=java-1.6.0-ibm-1 AND versionEndExcluding=1.6.0.16.3-1jpp.1.el5
vendor=Red Hat Enterprise Linux AND product=network_satellite AND version=5.6
AND
product=candlepin-0 AND versionEndExcluding=0.9.23.1-1.el6
vendor=Red Hat Enterprise Linux AND product=satellite AND version=6.0
AND
product=foreman-0 AND versionEndExcluding=1.6.0.49-1.el6sat
vendor=Red Hat Enterprise Linux AND product=satellite AND version=6.0
AND
product=katello-agent-0 AND versionEndExcluding=1.5.3-6.el7sat
vendor=Red Hat Enterprise Linux AND product=satellite AND version=6.0
AND
product=pulp-0 AND versionEndExcluding=2.4.3-1.el6sat
vendor=Red Hat Enterprise Linux AND product=satellite AND version=6.0
AND
product=pulp-nodes-0 AND versionEndExcluding=2.4.3-0.1.beta.el7sat
vendor=Red Hat Enterprise Linux AND product=satellite AND version=6.0
AND
product=pulp-puppet-0 AND versionEndExcluding=2.4.3-1.el6sat
vendor=Red Hat Enterprise Linux AND product=satellite AND version=6.0
AND
product=pulp-rpm-0 AND versionEndExcluding=2.4.3-1.el6sat
vendor=Red Hat Enterprise Linux AND product=satellite AND version=6.0
AND
product=ruby193-rubygem-katello-0 AND versionEndExcluding=1.5.0-93.el7sat
vendor=Red Hat Enterprise Linux AND product=satellite AND version=6.0
AND
product=rubygem-apipie-bindings-0 AND versionEndExcluding=0.0.8-2.el7sat
vendor=Red Hat Enterprise Linux AND product=satellite AND version=6.0
AND
product=rubygem-hammer_cli_import-0 AND versionEndExcluding=0.10.4-1.3.el6sat
vendor=Red Hat Enterprise Linux AND product=satellite AND version=6.0
AND
product=java-1.6.0-ibm-1 AND versionEndExcluding=1.6.0.16.2-1jpp.1.el6_6
vendor=Red Hat Enterprise Linux AND product=rhel_extras AND version=6
AND
product=java-1.7.1-ibm-1 AND versionEndExcluding=1.7.1.2.0-1jpp.3.el6_6
vendor=Red Hat Enterprise Linux AND product=rhel_extras AND version=6
AND
product=java-1.5.0-ibm-1 AND versionEndExcluding=1.5.0.16.8-1jpp.1.el6_6
vendor=Red Hat Enterprise Linux AND product=rhel_extras AND version=6
AND
product=java-1.7.0-ibm-1 AND versionEndExcluding=1.7.0.8.0-1jpp.1.el6_6
vendor=Red Hat Enterprise Linux AND product=rhel_extras AND version=6
AND
product=java-1.7.1-ibm-1 AND versionEndExcluding=1.7.1.2.0-1jpp.3.el7_0
vendor=Red Hat Enterprise Linux AND product=rhel_extras AND version=7
AND
product=jenkins AND version=
vendor=Red Hat Enterprise Linux AND product=openshift AND version=1
AND
product=puppet AND version=
vendor=Red Hat Enterprise Linux AND product=openstack-installer AND version=5
AND
product=puppet AND version=
vendor=Red Hat Enterprise Linux AND product=openstack AND version=5
AND
product=puppet AND version=
vendor=Red Hat Enterprise Linux AND product=openstack AND version=6
AND
product=puppet AND version=
vendor=Red Hat Enterprise Linux AND product=openstack-installer AND version=6
AND
product=puppet AND version=
vendor=Red Hat Enterprise Linux AND product=openstack AND version=7
AND
product=mingw-virt-viewer AND version=
vendor=Red Hat Enterprise Linux AND product=enterprise_linux AND version=
AND
product=openssl AND version=
vendor=Red Hat Enterprise Linux AND product=jboss_enterprise_application_platform AND version=5
AND
product=openssl AND version=
vendor=Red Hat Enterprise Linux AND product=jboss_enterprise_web_server AND version=1
AND
product=puppet AND version=
vendor=Red Hat Enterprise Linux AND product=openstack AND version=8
AND
product=puppet AND version=
vendor=Red Hat Enterprise Linux AND product=openstack AND version=9
AND
product=openssl AND version=
vendor=Red Hat Enterprise Linux AND product=storage AND version=2
AND
product=rhev-hypervisor AND version=
vendor=Red Hat Enterprise Linux AND product=rhev_manager AND version=
 

Reference

 


Keywords

REDHAT

 

CVE-2014-3566

 

CVE

 

Common vulnerabilities & exposures

 

CVSS

 

Common vulnerability scoring system

 

Security

 

Vulnerabilities

 

Exposures

 

We use cookies to ensure that we give you the best experience on our website. Read privacy policies for more information.