wid-sec-w-2024-3230
Vulnerability from csaf_certbund
Published
2024-10-16 22:00
Modified
2025-08-04 22:00
Summary
OpenSSL: Schwachstelle ermöglicht Denial of Service und Remote-Code-Ausführung
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
OpenSSL ist eine im Quelltext frei verfügbare Bibliothek, die Secure Sockets Layer (SSL) und Transport Layer Security (TLS) implementiert.
Angriff
Ein entfernter, anonymer Angreifer kann eine Schwachstelle in OpenSSL ausnutzen, um einen Denial of Service Angriff durchzuführen oder um beliebigen Code auszuführen.
Betroffene Betriebssysteme
- Linux
- Sonstiges
- UNIX
- Windows
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "OpenSSL ist eine im Quelltext frei verf\u00fcgbare Bibliothek, die Secure Sockets Layer (SSL) und Transport Layer Security (TLS) implementiert.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann eine Schwachstelle in OpenSSL ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren oder um beliebigen Code auszuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- Sonstiges\n- UNIX\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-3230 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-3230.json" }, { "category": "self", "summary": "WID-SEC-2024-3230 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-3230" }, { "category": "external", "summary": "OpenSSL Security Advisory vom 2024-10-16", "url": "https://openssl-library.org/news/secadv/20241016.txt" }, { "category": "external", "summary": "OSS Security Mailing List vom 2024-10-16", "url": "https://seclists.org/oss-sec/2024/q4/33" }, { "category": "external", "summary": "openSUSE Security Update OPENSUSE-SU-2024:14416-1 vom 2024-10-21", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZAEWAWTQ662APXDOVFSO6WSPPJ73EELU/" }, { "category": "external", "summary": "openSUSE Security Update OPENSUSE-SU-2024:14416-1 vom 2024-10-21", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/ZAEWAWTQ662APXDOVFSO6WSPPJ73EELU/" }, { "category": "external", "summary": "Debian Security Advisory DLA-3942 vom 2024-10-31", "url": "https://lists.debian.org/debian-lts-announce/2024/10/msg00033.html" }, { "category": "external", "summary": "IBM Security Bulletin 7178390 vom 2024-12-10", "url": "https://www.ibm.com/support/pages/node/7178390" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2024-2722 vom 2024-12-20", "url": "https://alas.aws.amazon.com/AL2/ALAS-2024-2722.html" }, { "category": "external", "summary": "IBM Security Bulletin 7180215 vom 2025-01-03", "url": "https://www.ibm.com/support/pages/node/7180215" }, { "category": "external", "summary": "Alpine Annonuce vom 2025-01-06", "url": "https://lists.alpinelinux.org/~alpine/announce/%3C20250106205852.020f34cd%40ncopa-desktop%3E" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7264-1 vom 2025-02-11", "url": "https://ubuntu.com/security/notices/USN-7264-1" }, { "category": "external", "summary": "IBM Security Bulletin 7183091 vom 2025-02-12", "url": "https://www.ibm.com/support/pages/node/7183091" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7278-1 vom 2025-02-20", "url": "https://ubuntu.com/security/notices/USN-7278-1" }, { "category": "external", "summary": "IBM Security Bulletin 7183993 vom 2025-02-22", "url": "https://www.ibm.com/support/pages/node/7183993" }, { "category": "external", "summary": "IBM Security Bulletin 7184055 vom 2025-02-24", "url": "https://www.ibm.com/support/pages/node/7184055" }, { "category": "external", "summary": "IBM Security Bulletin 7184453 vom 2025-02-28", "url": "https://www.ibm.com/support/pages/node/7184453" }, { "category": "external", "summary": "IBM Security Bulletin 7184326 vom 2025-02-27", "url": "https://www.ibm.com/support/pages/node/7184326" }, { "category": "external", "summary": "IBM Security Bulletin 7229072 vom 2025-03-26", "url": "https://www.ibm.com/support/pages/node/7229072" }, { "category": "external", "summary": "FreeBSD Advisory", "url": "https://www.freebsd.org/security/advisories/FreeBSD-EN-25:07.openssl.asc" }, { "category": "external", "summary": "IBM Security Bulletin 7231057 vom 2025-04-16", "url": "https://www.ibm.com/support/pages/node/7231057" }, { "category": "external", "summary": "IBM Security Bulletin 7231774 vom 2025-05-02", "url": "https://www.ibm.com/support/pages/node/7231774" }, { "category": "external", "summary": "XEROX Security Advisory XRX25-011 vom 2025-05-23", "url": "https://security.business.xerox.com/wp-content/uploads/2025/05/Xerox-Security-Bulletin-XRX25-011-for-Xerox-FreeFlow-Print-Server-v9.pdf" }, { "category": "external", "summary": "Tenable Security Advisory TNS-2025-10 vom 2025-05-22", "url": "https://de.tenable.com/security/tns-2025-10" }, { "category": "external", "summary": "XEROX Security Advisory XRX25-010 vom 2025-05-23", "url": "https://security.business.xerox.com/wp-content/uploads/2025/05/Xerox-Security-Bulletin-XRX25-010-for-Xerox-FreeFlow-Print-Server-v7.pdf" }, { "category": "external", "summary": "XEROX Security Advisory XRX25-012 vom 2025-06-02", "url": "https://security.business.xerox.com/wp-content/uploads/2025/06/Xerox-Security-Bulletin-XRX25-012-for-Xerox-FreeFlow-Print-Server-v9.pdf" }, { "category": "external", "summary": "IBM Security Bulletin 7237707 vom 2025-06-24", "url": "https://www.ibm.com/support/pages/node/7237707" }, { "category": "external", "summary": "Splunk Security Advisory SVD-2025-0710 vom 2025-07-07", "url": "https://advisory.splunk.com//advisories/SVD-2025-0710" }, { "category": "external", "summary": "Dell Security Advisory DSA-2025-203 vom 2025-07-08", "url": "https://www.dell.com/support/kbdoc/de-de/000318839/dsa-2025-203" }, { "category": "external", "summary": "Dell Security Advisory DSA-2025-289 vom 2025-07-17", "url": "https://www.dell.com/support/kbdoc/000345850" }, { "category": "external", "summary": "SolarWinds Platform 2025.2.1 release notes vom 2025-07-24", "url": "https://documentation.solarwinds.com/en/success_center/orionplatform/content/release_notes/solarwinds_platform_2025-2-1_release_notes.htm" }, { "category": "external", "summary": "Security Update for Dell PowerProtect Data Domain", "url": "https://www.dell.com/support/kbdoc/en-us/000348708/dsa-2025-159-security-update-for-dell-powerprotect-data-domain-multiple-vulnerabilities" } ], "source_lang": "en-US", "title": "OpenSSL: Schwachstelle erm\u00f6glicht Denial of Service und Remote-Code-Ausf\u00fchrung", "tracking": { "current_release_date": "2025-08-04T22:00:00.000+00:00", "generator": { "date": "2025-08-05T07:20:33.870+00:00", "engine": { "name": "BSI-WID", "version": "1.4.0" } }, "id": "WID-SEC-W-2024-3230", "initial_release_date": "2024-10-16T22:00:00.000+00:00", "revision_history": [ { "date": "2024-10-16T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2024-10-21T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von openSUSE aufgenommen" }, { "date": "2024-10-23T22:00:00.000+00:00", "number": "3", "summary": "Anpassung der Bewertung" }, { "date": "2024-10-30T23:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2024-12-10T23:00:00.000+00:00", "number": "5", "summary": "Neue Updates von IBM und IBM-APAR aufgenommen" }, { "date": "2024-12-19T23:00:00.000+00:00", "number": "6", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2025-01-05T23:00:00.000+00:00", "number": "7", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2025-01-06T23:00:00.000+00:00", "number": "8", "summary": "Neue Updates aufgenommen" }, { "date": "2025-02-11T23:00:00.000+00:00", "number": "9", "summary": "Neue Updates von Ubuntu und IBM aufgenommen" }, { "date": "2025-02-20T23:00:00.000+00:00", "number": "10", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-02-23T23:00:00.000+00:00", "number": "11", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2025-02-24T23:00:00.000+00:00", "number": "12", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2025-02-27T23:00:00.000+00:00", "number": "13", "summary": "Neue Updates von IBM und IBM-APAR aufgenommen" }, { "date": "2025-03-26T23:00:00.000+00:00", "number": "14", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2025-04-10T22:00:00.000+00:00", "number": "15", "summary": "Neue Updates von FreeBSD aufgenommen" }, { "date": "2025-04-16T22:00:00.000+00:00", "number": "16", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2025-05-04T22:00:00.000+00:00", "number": "17", "summary": "Neue Updates von IBM und IBM-APAR aufgenommen" }, { "date": "2025-05-22T22:00:00.000+00:00", "number": "18", "summary": "Neue Updates von XEROX und Tenable aufgenommen" }, { "date": "2025-06-02T22:00:00.000+00:00", "number": "19", "summary": "Neue Updates von XEROX aufgenommen" }, { "date": "2025-06-23T22:00:00.000+00:00", "number": "20", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2025-07-07T22:00:00.000+00:00", "number": "21", "summary": "Neue Updates von Splunk-SVD aufgenommen" }, { "date": "2025-07-08T22:00:00.000+00:00", "number": "22", "summary": "Neue Updates von Dell aufgenommen" }, { "date": "2025-07-16T22:00:00.000+00:00", "number": "23", "summary": "Neue Updates von Dell aufgenommen" }, { "date": "2025-07-23T22:00:00.000+00:00", "number": "24", "summary": "Neue Updates aufgenommen" }, { "date": "2025-08-04T22:00:00.000+00:00", "number": "25", "summary": "Neue Updates von Dell aufgenommen" } ], "status": "final", "version": "25" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Amazon Linux 2", "product": { "name": "Amazon Linux 2", "product_id": "398363", "product_identification_helper": { "cpe": "cpe:/o:amazon:linux_2:-" } } } ], "category": "vendor", "name": "Amazon" }, { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "category": "product_name", "name": "Dell Computer", "product": { "name": "Dell Computer", "product_id": "T036868", "product_identification_helper": { "cpe": "cpe:/o:dell:dell_computer:-" } } }, { "branches": [ { "category": "product_version", "name": "T40", "product": { "name": "Dell PowerEdge T40", "product_id": "T027537", "product_identification_helper": { "cpe": "cpe:/h:dell:poweredge:t40" } } } ], "category": "product_name", "name": "PowerEdge" }, { "category": "product_name", "name": "Dell PowerProtect Data Domain", "product": { "name": "Dell PowerProtect Data Domain", "product_id": "T045852", "product_identification_helper": { "cpe": "cpe:/a:dell:powerprotect_data_domain:-" } } }, { "category": "product_name", "name": "Dell PowerProtect Data Domain Management Center", "product": { "name": "Dell PowerProtect Data Domain Management Center", "product_id": "T045853", "product_identification_helper": { "cpe": "cpe:/a:dell:powerprotect_data_domain_management_center:-" } } }, { "category": "product_name", "name": "Dell PowerProtect Data Domain OS", "product": { "name": "Dell PowerProtect Data Domain OS", "product_id": "T045854", "product_identification_helper": { "cpe": "cpe:/o:dell:powerprotect_data_domain_os:-" } } } ], "category": "vendor", "name": "Dell" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c14.2-STABLE", "product": { "name": "FreeBSD Project FreeBSD OS \u003c14.2-STABLE", "product_id": "T040689" } }, { "category": "product_version", "name": "14.2-STABLE", "product": { "name": "FreeBSD Project FreeBSD OS 14.2-STABLE", "product_id": "T040689-fixed", "product_identification_helper": { "cpe": "cpe:/o:freebsd:freebsd:14.2-stable" } } }, { "category": "product_version_range", "name": "\u003c14.2-RELEASE-p3", "product": { "name": "FreeBSD Project FreeBSD OS \u003c14.2-RELEASE-p3", "product_id": "T042746" } }, { "category": "product_version", "name": "14.2-RELEASE-p3", "product": { "name": "FreeBSD Project FreeBSD OS 14.2-RELEASE-p3", "product_id": "T042746-fixed", "product_identification_helper": { "cpe": "cpe:/o:freebsd:freebsd:14.2-release-p3" } } } ], "category": "product_name", "name": "FreeBSD OS" } ], "category": "vendor", "name": "FreeBSD Project" }, { "branches": [ { "branches": [ { "category": "product_version", "name": "7.3", "product": { "name": "IBM AIX 7.3", "product_id": "1139691", "product_identification_helper": { "cpe": "cpe:/o:ibm:aix:7.3" } } }, { "category": "product_version", "name": "7.2", "product": { "name": "IBM AIX 7.2", "product_id": "434967", "product_identification_helper": { "cpe": "cpe:/o:ibm:aix:7.2" } } } ], "category": "product_name", "name": "AIX" }, { "branches": [ { "category": "product_version_range", "name": "\u003c13.0.2.0", "product": { "name": "IBM App Connect Enterprise \u003c13.0.2.0", "product_id": "T039657" } }, { "category": "product_version", "name": "13.0.2.0", "product": { "name": "IBM App Connect Enterprise 13.0.2.0", "product_id": "T039657-fixed", "product_identification_helper": { "cpe": "cpe:/a:ibm:app_connect_enterprise:13.0.2.0" } } }, { "category": "product_version_range", "name": "\u003c12.0.12.9", "product": { "name": "IBM App Connect Enterprise \u003c12.0.12.9", "product_id": "T039658" } }, { "category": "product_version", "name": "12.0.12.9", "product": { "name": "IBM App Connect Enterprise 12.0.12.9", "product_id": "T039658-fixed", "product_identification_helper": { "cpe": "cpe:/a:ibm:app_connect_enterprise:12.0.12.9" } } }, { "category": "product_version_range", "name": "\u003c13.0.3.0", "product": { "name": "IBM App Connect Enterprise \u003c13.0.3.0", "product_id": "T042220" } }, { "category": "product_version", "name": "13.0.3.0", "product": { "name": "IBM App Connect Enterprise 13.0.3.0", "product_id": "T042220-fixed", "product_identification_helper": { "cpe": "cpe:/a:ibm:app_connect_enterprise:13.0.3.0" } } }, { "category": "product_version_range", "name": "\u003c12.0.12.13", "product": { "name": "IBM App Connect Enterprise \u003c12.0.12.13", "product_id": "T042955" } }, { "category": "product_version", "name": "12.0.12.13", "product": { "name": "IBM App Connect Enterprise 12.0.12.13", "product_id": "T042955-fixed", "product_identification_helper": { "cpe": "cpe:/a:ibm:app_connect_enterprise:12.0.12.13" } } } ], "category": "product_name", "name": "App Connect Enterprise" }, { "branches": [ { "category": "product_version", "name": "11.7", "product": { "name": "IBM InfoSphere Information Server 11.7", "product_id": "444803", "product_identification_helper": { "cpe": "cpe:/a:ibm:infosphere_information_server:11.7" } } } ], "category": "product_name", "name": "InfoSphere Information Server" }, { "branches": [ { "category": "product_version_range", "name": "\u003c13.0.3.0", "product": { "name": "IBM Integration Bus \u003c13.0.3.0", "product_id": "T042954" } }, { "category": "product_version", "name": "13.0.3.0", "product": { "name": "IBM Integration Bus 13.0.3.0", "product_id": "T042954-fixed", "product_identification_helper": { "cpe": "cpe:/a:ibm:integration_bus:13.0.3.0" } } } ], "category": "product_name", "name": "Integration Bus" }, { "branches": [ { "category": "product_version", "name": "9.4", "product": { "name": "IBM MQ 9.4", "product_id": "T035670", "product_identification_helper": { "cpe": "cpe:/a:ibm:mq:9.4" } } }, { "category": "product_version", "name": "Operator v3.5.0", "product": { "name": "IBM MQ Operator v3.5.0", "product_id": "T041481", "product_identification_helper": { "cpe": "cpe:/a:ibm:mq:operator_v3.5.0" } } }, { "category": "product_version", "name": "Operator v3.2.9", "product": { "name": "IBM MQ Operator v3.2.9", "product_id": "T041482", "product_identification_helper": { "cpe": "cpe:/a:ibm:mq:operator_v3.2.9" } } }, { "category": "product_version", "name": "Container 9.4.2.0-r1", "product": { "name": "IBM MQ Container 9.4.2.0-r1", "product_id": "T041483", "product_identification_helper": { "cpe": "cpe:/a:ibm:mq:container_9.4.2.0-r1" } } } ], "category": "product_name", "name": "MQ" }, { "branches": [ { "category": "product_version_range", "name": "\u003c8.0.0.28", "product": { "name": "IBM Rational Build Forge \u003c8.0.0.28", "product_id": "T044783" } }, { "category": "product_version", "name": "8.0.0.28", "product": { "name": "IBM Rational Build Forge 8.0.0.28", "product_id": "T044783-fixed", "product_identification_helper": { "cpe": "cpe:/a:ibm:rational_build_forge:8.0.0.28" } } } ], "category": "product_name", "name": "Rational Build Forge" }, { "branches": [ { "category": "product_version", "name": "SPSS Collaboration and Deployment Services 8.5", "product": { "name": "IBM SPSS SPSS Collaboration and Deployment Services 8.5", "product_id": "T042175", "product_identification_helper": { "cpe": "cpe:/a:ibm:spss:spss_collaboration_and_deployment_services_8.5" } } } ], "category": "product_name", "name": "SPSS" }, { "branches": [ { "category": "product_version", "name": "6.3.0", "product": { "name": "IBM Sterling Connect:Direct 6.3.0", "product_id": "T040001", "product_identification_helper": { "cpe": "cpe:/a:ibm:sterling_connect%3adirect:6.3.0" } } }, { "category": "product_version", "name": "6.4.0", "product": { "name": "IBM Sterling Connect:Direct 6.4.0", "product_id": "T040002", "product_identification_helper": { "cpe": "cpe:/a:ibm:sterling_connect%3adirect:6.4.0" } } }, { "category": "product_version_range", "name": "\u003c6.1.0.27", "product": { "name": "IBM Sterling Connect:Direct \u003c6.1.0.27", "product_id": "T040672" } }, { "category": "product_version", "name": "6.1.0.27", "product": { "name": "IBM Sterling Connect:Direct 6.1.0.27", "product_id": "T040672-fixed", "product_identification_helper": { "cpe": "cpe:/a:ibm:sterling_connect%3adirect:6.1.0.27" } } }, { "category": "product_version_range", "name": "\u003c6.2.0.26", "product": { "name": "IBM Sterling Connect:Direct \u003c6.2.0.26", "product_id": "T040726" } }, { "category": "product_version", "name": "6.2.0.26", "product": { "name": "IBM Sterling Connect:Direct 6.2.0.26", "product_id": "T040726-fixed", "product_identification_helper": { "cpe": "cpe:/a:ibm:sterling_connect%3adirect:6.2.0.26" } } }, { "category": "product_version_range", "name": "for Unix \u003c6.1.0.4.iFix121", "product": { "name": "IBM Sterling Connect:Direct for Unix \u003c6.1.0.4.iFix121", "product_id": "T041373" } }, { "category": "product_version", "name": "for Unix 6.1.0.4.iFix121", "product": { "name": "IBM Sterling Connect:Direct for Unix 6.1.0.4.iFix121", "product_id": "T041373-fixed", "product_identification_helper": { "cpe": "cpe:/a:ibm:sterling_connect%3adirect:for_unix__6.1.0.4.ifix121" } } }, { "category": "product_version_range", "name": "for Unix \u003c6.3.0.4.iFix004", "product": { "name": "IBM Sterling Connect:Direct for Unix \u003c6.3.0.4.iFix004", "product_id": "T041374" } }, { "category": "product_version", "name": "for Unix 6.3.0.4.iFix004", "product": { "name": "IBM Sterling Connect:Direct for Unix 6.3.0.4.iFix004", "product_id": "T041374-fixed", "product_identification_helper": { "cpe": "cpe:/a:ibm:sterling_connect%3adirect:for_unix__6.3.0.4.ifix004" } } }, { "category": "product_version_range", "name": "for Unix \u003c6.4.0.1.iFix005", "product": { "name": "IBM Sterling Connect:Direct for Unix \u003c6.4.0.1.iFix005", "product_id": "T041375" } }, { "category": "product_version", "name": "for Unix 6.4.0.1.iFix005", "product": { "name": "IBM Sterling Connect:Direct for Unix 6.4.0.1.iFix005", "product_id": "T041375-fixed", "product_identification_helper": { "cpe": "cpe:/a:ibm:sterling_connect%3adirect:for_unix__6.4.0.1.ifix005" } } } ], "category": "product_name", "name": "Sterling Connect:Direct" }, { "branches": [ { "category": "product_version", "name": "3.1", "product": { "name": "IBM VIOS 3.1", "product_id": "1039165", "product_identification_helper": { "cpe": "cpe:/a:ibm:vios:3.1" } } }, { "category": "product_version", "name": "4.1", "product": { "name": "IBM VIOS 4.1", "product_id": "1522854", "product_identification_helper": { "cpe": "cpe:/a:ibm:vios:4.1" } } } ], "category": "product_name", "name": "VIOS" } ], "category": "vendor", "name": "IBM" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c3.18.10", "product": { "name": "Open Source Alpine Linux \u003c3.18.10", "product_id": "T040035" } }, { "category": "product_version", "name": "3.18.10", "product": { "name": "Open Source Alpine Linux 3.18.10", "product_id": "T040035-fixed", "product_identification_helper": { "cpe": "cpe:/a:alpinelinux:alpine_linux:3.18.10" } } }, { "category": "product_version_range", "name": "\u003c3.19.5", "product": { "name": "Open Source Alpine Linux \u003c3.19.5", "product_id": "T040036" } }, { "category": "product_version", "name": "3.19.5", "product": { "name": "Open Source Alpine Linux 3.19.5", "product_id": "T040036-fixed", "product_identification_helper": { "cpe": "cpe:/a:alpinelinux:alpine_linux:3.19.5" } } }, { "category": "product_version_range", "name": "\u003c3.20.4", "product": { "name": "Open Source Alpine Linux \u003c3.20.4", "product_id": "T040037" } }, { "category": "product_version", "name": "3.20.4", "product": { "name": "Open Source Alpine Linux 3.20.4", "product_id": "T040037-fixed", "product_identification_helper": { "cpe": "cpe:/a:alpinelinux:alpine_linux:3.20.4" } } } ], "category": "product_name", "name": "Alpine Linux" }, { "branches": [ { "category": "product_version_range", "name": "\u003c3.3.3", "product": { "name": "Open Source OpenSSL \u003c3.3.3", "product_id": "T038469" } }, { "category": "product_version", "name": "3.3.3", "product": { "name": "Open Source OpenSSL 3.3.3", "product_id": "T038469-fixed", "product_identification_helper": { "cpe": "cpe:/a:openssl:openssl:3.3.3" } } }, { "category": "product_version_range", "name": "\u003c3.2.4", "product": { "name": "Open Source OpenSSL \u003c3.2.4", "product_id": "T038470" } }, { "category": "product_version", "name": "3.2.4", "product": { "name": "Open Source OpenSSL 3.2.4", "product_id": "T038470-fixed", "product_identification_helper": { "cpe": "cpe:/a:openssl:openssl:3.2.4" } } }, { "category": "product_version_range", "name": "\u003c3.1.8", "product": { "name": "Open Source OpenSSL \u003c3.1.8", "product_id": "T038471" } }, { "category": "product_version", "name": "3.1.8", "product": { "name": "Open Source OpenSSL 3.1.8", "product_id": "T038471-fixed", "product_identification_helper": { "cpe": "cpe:/a:openssl:openssl:3.1.8" } } }, { "category": "product_version_range", "name": "\u003c3.0.16", "product": { "name": "Open Source OpenSSL \u003c3.0.16", "product_id": "T038472" } }, { "category": "product_version", "name": "3.0.16", "product": { "name": "Open Source OpenSSL 3.0.16", "product_id": "T038472-fixed", "product_identification_helper": { "cpe": "cpe:/a:openssl:openssl:3.0.16" } } }, { "category": "product_version_range", "name": "\u003c1.1.1zb", "product": { "name": "Open Source OpenSSL \u003c1.1.1zb", "product_id": "T038473" } }, { "category": "product_version", "name": "1.1.1zb", "product": { "name": "Open Source OpenSSL 1.1.1zb", "product_id": "T038473-fixed", "product_identification_helper": { "cpe": "cpe:/a:openssl:openssl:1.1.1zb" } } }, { "category": "product_version_range", "name": "\u003c1.0.2zl", "product": { "name": "Open Source OpenSSL \u003c1.0.2zl", "product_id": "T038474" } }, { "category": "product_version", "name": "1.0.2zl", "product": { "name": "Open Source OpenSSL 1.0.2zl", "product_id": "T038474-fixed", "product_identification_helper": { "cpe": "cpe:/a:openssl:openssl:1.0.2zl" } } } ], "category": "product_name", "name": "OpenSSL" } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "category": "product_name", "name": "SUSE openSUSE", "product": { "name": "SUSE openSUSE", "product_id": "T027843", "product_identification_helper": { "cpe": "cpe:/o:suse:opensuse:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c2025.2.1", "product": { "name": "SolarWinds Platform \u003c2025.2.1", "product_id": "T045629" } }, { "category": "product_version", "name": "2025.2.1", "product": { "name": "SolarWinds Platform 2025.2.1", "product_id": "T045629-fixed", "product_identification_helper": { "cpe": "cpe:/a:solarwinds:orion_platform:2025.2.1" } } } ], "category": "product_name", "name": "Platform" } ], "category": "vendor", "name": "SolarWinds" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c9.4.3", "product": { "name": "Splunk Splunk Enterprise \u003c9.4.3", "product_id": "T045086" } }, { "category": "product_version", "name": "9.4.3", "product": { "name": "Splunk Splunk Enterprise 9.4.3", "product_id": "T045086-fixed", "product_identification_helper": { "cpe": "cpe:/a:splunk:splunk:9.4.3" } } }, { "category": "product_version_range", "name": "\u003c9.3.5", "product": { "name": "Splunk Splunk Enterprise \u003c9.3.5", "product_id": "T045087" } }, { "category": "product_version", "name": "9.3.5", "product": { "name": "Splunk Splunk Enterprise 9.3.5", "product_id": "T045087-fixed", "product_identification_helper": { "cpe": "cpe:/a:splunk:splunk:9.3.5" } } }, { "category": "product_version_range", "name": "\u003c9.2.7", "product": { "name": "Splunk Splunk Enterprise \u003c9.2.7", "product_id": "T045088" } }, { "category": "product_version", "name": "9.2.7", "product": { "name": "Splunk Splunk Enterprise 9.2.7", "product_id": "T045088-fixed", "product_identification_helper": { "cpe": "cpe:/a:splunk:splunk:9.2.7" } } }, { "category": "product_version_range", "name": "\u003c9.1.10", "product": { "name": "Splunk Splunk Enterprise \u003c9.1.10", "product_id": "T045089" } }, { "category": "product_version", "name": "9.1.10", "product": { "name": "Splunk Splunk Enterprise 9.1.10", "product_id": "T045089-fixed", "product_identification_helper": { "cpe": "cpe:/a:splunk:splunk:9.1.10" } } } ], "category": "product_name", "name": "Splunk Enterprise" } ], "category": "vendor", "name": "Splunk" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c6.5.1", "product": { "name": "Tenable Security Nessus Network Monitor \u003c6.5.1", "product_id": "T044107" } }, { "category": "product_version", "name": "6.5.1", "product": { "name": "Tenable Security Nessus Network Monitor 6.5.1", "product_id": "T044107-fixed", "product_identification_helper": { "cpe": "cpe:/a:tenable:nessus_network_monitor:6.5.1" } } } ], "category": "product_name", "name": "Nessus Network Monitor" } ], "category": "vendor", "name": "Tenable Security" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" }, { "branches": [ { "branches": [ { "category": "product_version", "name": "7", "product": { "name": "Xerox FreeFlow Print Server 7", "product_id": "T000872", "product_identification_helper": { "cpe": "cpe:/a:xerox:freeflow_print_server:7" } } }, { "category": "product_version", "name": "9", "product": { "name": "Xerox FreeFlow Print Server 9", "product_id": "T002977", "product_identification_helper": { "cpe": "cpe:/a:xerox:freeflow_print_server:9" } } } ], "category": "product_name", "name": "FreeFlow Print Server" } ], "category": "vendor", "name": "Xerox" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-9143", "product_status": { "known_affected": [ "T040726", "T036868", "T039658", "T002977", "T039657", "1139691", "T042954", "T042955", "T000872", "398363", "434967", "1039165", "1522854", "T041374", "T045853", "T041373", "T045852", "T045854", "2951", "444803", "T042746", "T027843", "T040689", "T040002", "T040001", "T042220", "T041375", "T035670", "T038469", "T041483", "T041482", "T041481", "T027537", "T045086", "T045088", "T040037", "T045087", "T040036", "T040035", "T042175", "T045089", "T040672", "T045629", "T038474", "T038470", "T038471", "T038472", "T038473", "T044107", "T000126", "T044783" ] }, "release_date": "2024-10-16T22:00:00.000+00:00", "title": "CVE-2024-9143" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…