<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: CVE-2014-0198 - Anyone have a signature? in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/cve-2014-0198-anyone-have-a-signature/m-p/30664#M22446</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Ericcapuano,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So far, &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;PAN threat database&lt;/SPAN&gt; is not having any signature for the above mentioned CVE. I would request you to open a case with support, so that they will verify the coverage for this CVE.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 14 May 2014 23:12:49 GMT</pubDate>
    <dc:creator>HULK</dc:creator>
    <dc:date>2014-05-14T23:12:49Z</dc:date>
    <item>
      <title>CVE-2014-0198 - Anyone have a signature?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/cve-2014-0198-anyone-have-a-signature/m-p/30663#M22445</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Curious if anyone else is working on or looking for a signature for this vuln: &lt;A href="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-0198" title="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-0198"&gt;NVD - Detail&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;DoS vulnerability brought about by a bug in OpenSSL. Is PAN working on a signature by chance?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Details: The do_ssl3_write function in s3_pkt.c in OpenSSL 1.x through 1.0.1g, when SSL_MODE_RELEASE_BUFFERS is enabled, does not properly manage a buffer pointer during certain recursive calls, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via vectors that trigger an alert condition.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 14 May 2014 19:42:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/cve-2014-0198-anyone-have-a-signature/m-p/30663#M22445</guid>
      <dc:creator>Cap</dc:creator>
      <dc:date>2014-05-14T19:42:28Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2014-0198 - Anyone have a signature?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/cve-2014-0198-anyone-have-a-signature/m-p/30664#M22446</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Ericcapuano,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So far, &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;PAN threat database&lt;/SPAN&gt; is not having any signature for the above mentioned CVE. I would request you to open a case with support, so that they will verify the coverage for this CVE.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 14 May 2014 23:12:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/cve-2014-0198-anyone-have-a-signature/m-p/30664#M22446</guid>
      <dc:creator>HULK</dc:creator>
      <dc:date>2014-05-14T23:12:49Z</dc:date>
    </item>
  </channel>
</rss>

