cpe:/a:openssl:openssl:1.0.0 cpe:/a:openssl:openssl:1.0.0:beta1 cpe:/a:openssl:openssl:1.0.0:beta2 cpe:/a:openssl:openssl:1.0.0:beta3 cpe:/a:openssl:openssl:1.0.0:beta4 cpe:/a:openssl:openssl:1.0.0:beta5 cpe:/a:openssl:openssl:1.0.0a cpe:/a:openssl:openssl:1.0.0b cpe:/a:openssl:openssl:1.0.0c cpe:/a:openssl:openssl:1.0.0d cpe:/a:openssl:openssl:1.0.0e cpe:/a:openssl:openssl:1.0.0f cpe:/a:openssl:openssl:1.0.0g cpe:/a:openssl:openssl:1.0.0h cpe:/a:openssl:openssl:1.0.0i cpe:/a:openssl:openssl:1.0.0j cpe:/a:openssl:openssl:1.0.0k cpe:/a:openssl:openssl:1.0.0l cpe:/a:openssl:openssl:1.0.0m cpe:/a:openssl:openssl:1.0.1 cpe:/a:openssl:openssl:1.0.1:beta1 cpe:/a:openssl:openssl:1.0.1:beta2 cpe:/a:openssl:openssl:1.0.1:beta3 cpe:/a:openssl:openssl:1.0.1a cpe:/a:openssl:openssl:1.0.1b cpe:/a:openssl:openssl:1.0.1c cpe:/a:openssl:openssl:1.0.1d cpe:/a:openssl:openssl:1.0.1e cpe:/a:openssl:openssl:1.0.1f cpe:/a:openssl:openssl:1.0.1g cpe:/a:openssl:openssl:1.0.1h CVE-2014-3512 2014-08-13T19:55:07.670-04:00 2017-08-28T21:34:46.733-04:00 7.5 NETWORK LOW NONE PARTIAL PARTIAL PARTIAL http://nvd.nist.gov 2014-08-14T11:19:47.573-04:00 SECTRACK 1030693 SECUNIA 59700 SECUNIA 59710 SECUNIA 59756 SECUNIA 60022 SECUNIA 60221 SECUNIA 60493 SECUNIA 60803 SECUNIA 60810 SECUNIA 60917 SECUNIA 60921 SECUNIA 61017 SECUNIA 61100 SECUNIA 61171 SECUNIA 61184 SECUNIA 61775 SECUNIA 61959 BID 69083 DEBIAN DSA-2998 FREEBSD FreeBSD-SA-14:18 GENTOO GLSA-201412-39 NETBSD NetBSD-SA2014-008 HP SSRT101846 MLIST [syslog-ng-announce] 20140910 syslog-ng Premium Edition 5 LTS (5.0.6a) has been released CONFIRM http://aix.software.ibm.com/aix/efixes/security/openssl_advisory10.asc CONFIRM http://support.f5.com/kb/en-us/solutions/public/15000/500/sol15565.html CONFIRM http://www-01.ibm.com/support/docview.wss?uid=nas8N1020240 CONFIRM http://www-01.ibm.com/support/docview.wss?uid=swg21682293 CONFIRM http://www-01.ibm.com/support/docview.wss?uid=swg21683389 CONFIRM http://www-01.ibm.com/support/docview.wss?uid=swg21686997 CONFIRM http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-372998.htm CONFIRM http://www.tenable.com/security/tns-2014-06 CONFIRM https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=4a23b12a031860253b58d503f296377ca076427b CONFIRM https://www.openssl.org/news/secadv_20140806.txt SUSE openSUSE-SU-2014:1052 XF openssl-cve20143512-dos(95158) Multiple buffer overflows in crypto/srp/srp_lib.c in the SRP implementation in OpenSSL 1.0.1 before 1.0.1i allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via an invalid SRP (1) g, (2) A, or (3) B parameter.