SSL: OpenSSL TLS DTLS Heartbeat Information Disclosure (Server, Client, and STARTTLS Support)

This signature detects attempts to exploit a known flaw in OpenSSL. An information disclosure vulnerability exists in OpenSSL. The vulnerability is due to an error when handling TLS/DTLS heartbeat packets. An attacker can leverage this vulnerability to disclose memory contents of a connected client or server. This signature is an alternate version to SSL:OPENSSL-TLS-DTLS-HEARTBEAT that supports both clients as well as servers, including STARTTLS connections. It is, however, extremely performance impacting and could also be false-positive prone. Its use, therefore, is not recommended in a general configuration and should only be used in specific circumstances where it is required. This is a non-Recommended, performance-impacting signature. It will not be in any predefined groups. You must add this signature, by name, manually to your policy, or create your own custom dynamic group.

Extended Description

The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before 1.0.1g do not properly handle Heartbeat Extension packets, which allows remote attackers to obtain sensitive information from process memory via crafted packets that trigger a buffer over-read, as demonstrated by reading private keys, related to d1_both.c and t1_lib.c, aka the Heartbleed bug.

Affected Products

Broadcom symantec_messaging_gateway

Short Name
SSL:OPENSSL-HEARTBEAT-ALTERNATE
Severity
Major
Recommended
False
Recommended Action
None
Category
SSL
Keywords
(Server, CVE-2014-0160 Client, DTLS Disclosure Heartbeat Information OpenSSL STARTTLS Support) TLS and bid:66690
Release Date
04/16/2014
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3719
False Positive
Rarely
Vendors

Filezilla-project

Redhat

Fedoraproject

Broadcom

Openssl

Opensuse

Siemens

Mitel

Splunk

Debian

Canonical

CVSS Score

5.0

Found a potential security threat?