<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://wiki.openssl.org/index.php?action=history&amp;feed=atom&amp;title=SECADV_20140605</id>
	<title>SECADV 20140605 - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://wiki.openssl.org/index.php?action=history&amp;feed=atom&amp;title=SECADV_20140605"/>
	<link rel="alternate" type="text/html" href="https://wiki.openssl.org/index.php?title=SECADV_20140605&amp;action=history"/>
	<updated>2026-04-11T14:57:16Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.35.13</generator>
	<entry>
		<id>https://wiki.openssl.org/index.php?title=SECADV_20140605&amp;diff=1721&amp;oldid=prev</id>
		<title>Tjh at 19:21, 6 June 2014</title>
		<link rel="alternate" type="text/html" href="https://wiki.openssl.org/index.php?title=SECADV_20140605&amp;diff=1721&amp;oldid=prev"/>
		<updated>2014-06-06T19:21:09Z</updated>

		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;table class=&quot;diff diff-contentalign-left diff-editfont-monospace&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 19:21, 6 June 2014&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l21&quot; &gt;Line 21:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 21:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;| SSL/TLS MITM vulnerability (and others)&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;| SSL/TLS MITM vulnerability (and others)&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;| [https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0224 CVE-2014-0224]  &lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;| [https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0224 CVE-2014-0224]  &lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;| OpenSSL-0.9.8a-&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;z&lt;/del&gt;, OpenSSL-1.0.0a-l, OpenSSL-1.0.1a-g&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;| OpenSSL-0.9.8a-&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;y&lt;/ins&gt;, OpenSSL-1.0.0a-l, OpenSSL-1.0.1a-g&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;| OpenSSL-0.9.8za, OpenSSL-1.0.0m, OpenSSL-1.0.1h&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;| OpenSSL-0.9.8za, OpenSSL-1.0.0m, OpenSSL-1.0.1h&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;|-&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;|-&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>Tjh</name></author>
	</entry>
	<entry>
		<id>https://wiki.openssl.org/index.php?title=SECADV_20140605&amp;diff=1699&amp;oldid=prev</id>
		<title>Tjh: Created page with &quot;= SECADV_20140605 =  SSL/TLS MITM vulnerability.  A missing bounds check in the handling of the TLS heartbeat extension can be used to reveal up to 64k of memory to a connected c…&quot;</title>
		<link rel="alternate" type="text/html" href="https://wiki.openssl.org/index.php?title=SECADV_20140605&amp;diff=1699&amp;oldid=prev"/>
		<updated>2014-06-05T23:31:43Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;= SECADV_20140605 =  SSL/TLS MITM vulnerability.  A missing bounds check in the handling of the TLS heartbeat extension can be used to reveal up to 64k of memory to a connected c…&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;= SECADV_20140605 =&lt;br /&gt;
&lt;br /&gt;
SSL/TLS MITM vulnerability.&lt;br /&gt;
&lt;br /&gt;
A missing bounds check in the handling of the TLS heartbeat extension can be&lt;br /&gt;
used to reveal up to 64k of memory to a connected client or server.&lt;br /&gt;
&lt;br /&gt;
This advisory covers multiple issues - this additional details page currently only covers one of the issues.&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | Date&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | Advisory&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | Description&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | CVE&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | Affected Versions&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; | Fixed In Versions&lt;br /&gt;
|-&lt;br /&gt;
| 05-Jun-2014 &lt;br /&gt;
| [https://www.openssl.org/news/secadv_20140605.txt SECADV_20140605] &lt;br /&gt;
| SSL/TLS MITM vulnerability (and others)&lt;br /&gt;
| [https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0224 CVE-2014-0224] &lt;br /&gt;
| OpenSSL-0.9.8a-z, OpenSSL-1.0.0a-l, OpenSSL-1.0.1a-g&lt;br /&gt;
| OpenSSL-0.9.8za, OpenSSL-1.0.0m, OpenSSL-1.0.1h&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Abstract ==&lt;br /&gt;
&lt;br /&gt;
An attacker using a carefully crafted handshake can force the use of weak&lt;br /&gt;
keying material in OpenSSL SSL/TLS clients and servers. This can be exploited&lt;br /&gt;
by a Man-in-the-middle (MITM) attack where the attacker can decrypt and &lt;br /&gt;
modify traffic from the attacked client and server.&lt;br /&gt;
&lt;br /&gt;
The attack can only be performed between a vulnerable client *and*&lt;br /&gt;
server. OpenSSL clients are vulnerable in all versions of OpenSSL. Servers&lt;br /&gt;
are only known to be vulnerable in OpenSSL 1.0.1 and 1.0.2-beta1. Users&lt;br /&gt;
of OpenSSL servers earlier than 1.0.1 are advised to upgrade as a precaution.&lt;br /&gt;
&lt;br /&gt;
== Solutions and Workarounds ==&lt;br /&gt;
&lt;br /&gt;
:* OpenSSL 0.9.8 SSL/TLS users (client and/or server) should upgrade to 0.9.8za.&lt;br /&gt;
:* OpenSSL 1.0.0 SSL/TLS users (client and/or server) should upgrade to 1.0.0m.&lt;br /&gt;
:* OpenSSL 1.0.1 SSL/TLS users (client and/or server) should upgrade to 1.0.1h.&lt;br /&gt;
&lt;br /&gt;
== Detecting Vulnerability ==&lt;br /&gt;
&lt;br /&gt;
TODO &lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
&lt;br /&gt;
:* [https://plus.google.com/u/0/+MarkJCox/posts/L8i6PSsKJKs Timeline] Mark J Cox&lt;br /&gt;
:* [http://ccsinjection.lepidum.co.jp/blog/2014-06-05/CCS-Injection-en/index.html '''How I discovered CCS Injection Vulnerability (CVE-2014-0224)'''] Masashi Kikuchi&lt;br /&gt;
:* [https://www.imperialviolet.org/2014/06/05/earlyccs.html '''Early ChangeCipherSpec Attack'''] Adam Langley&lt;/div&gt;</summary>
		<author><name>Tjh</name></author>
	</entry>
</feed>