Public Date:
CWE-130 -> CWE-119 -> CWE-201
1084875: CVE-2014-0160 openssl: information disclosure in handling of TLS heartbeat extension packets
An information disclosure flaw was found in the way OpenSSL handled TLS and DTLS Heartbeat Extension packets. A malicious TLS or DTLS client or server could send a specially crafted TLS or DTLS Heartbeat packet to disclose a limited portion of memory per request from a connected client or server. Note that the disclosed portions of memory could potentially include sensitive information such as private keys.

Find out more about CVE-2014-0160 from the MITRE CVE dictionary dictionary and NIST NVD.


This issue did not affect the versions of openssl as shipped with Red Hat Enterprise Linux 5, Red Hat Enterprise Linux 6.4 and earlier, Red Hat JBoss Enterprise Application Platform 5 and 6, and Red Hat JBoss Web Server 1 and 2. This issue does affect Red Hat Enterprise Linux 7 Beta, Red Hat Enterprise Linux 6.5, Red Hat Enterprise Virtualization Hypervisor 6.5, and Red Hat Storage 2.1, which provided openssl 1.0.1e. Errata have been released to correct this issue. Additional information can be found in the Red Hat Knowledgebase article:

CVSS v2 metrics

NOTE: The following CVSS v2 metrics and score provided are preliminary and subject to review.

Base Score 5
Base Metrics AV:N/AC:L/Au:N/C:P/I:N/A:N
Access Vector Network
Access Complexity Low
Authentication None
Confidentiality Impact Partial
Integrity Impact None
Availability Impact None

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Red Hat Security Errata

Platform Errata Release Date
Red Hat Enterprise Linux version 6 (openssl) RHSA-2014:0376 2014-04-08
Red Hat Storage Server 2.1 (openssl) RHSA-2014:0377 2014-04-08
RHEV-M for Servers (spice-client-msi) RHSA-2014:0416 2014-04-17
RHEV Hypervisor for RHEL-6 (rhev-hypervisor6) RHSA-2014:0396 2014-04-10
RHEV Hypervisor for RHEL-6 (rhev-hypervisor6) RHSA-2014:0378 2014-04-08

Affected Packages State

Platform Package State
Red Hat Enterprise Linux 6 openssl098e Not affected
Red Hat Enterprise Linux 7 openssl098e Not affected
Red Hat Enterprise Linux 5 openssl097a Not affected
Red Hat Enterprise Linux 7 openssl Not affected
Red Hat Enterprise Linux 5 openssl Not affected


Red Hat would like to thank the OpenSSL project for reporting this issue. Upstream acknowledges Neel Mehta of Google Security as the original reporter.

External References