<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: OpenSSL Heartbleed bug: CVE-2014-0160 in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/openssl-heartbleed-bug-cve-2014-0160/m-p/32886#M24120</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;no probs&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Should mention, if you have medium severity threats set to alert in the profile, make sure that the rule for heartbleed is above this! you can shuffle the ordering around in the vuln' protection profile.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 10 Apr 2014 13:35:00 GMT</pubDate>
    <dc:creator>Dpeters1</dc:creator>
    <dc:date>2014-04-10T13:35:00Z</dc:date>
    <item>
      <title>OpenSSL Heartbleed bug: CVE-2014-0160</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/openssl-heartbleed-bug-cve-2014-0160/m-p/32824#M24058</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just wondering if any Palo Alto versions are affected by this bug in OpenSSL?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://heartbleed.com/"&gt;http://heartbleed.com/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 08 Apr 2014 05:35:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/openssl-heartbleed-bug-cve-2014-0160/m-p/32824#M24058</guid>
      <dc:creator>AdamBatey</dc:creator>
      <dc:date>2014-04-08T05:35:20Z</dc:date>
    </item>
    <item>
      <title>Re: OpenSSL Heartbleed bug: CVE-2014-0160</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/openssl-heartbleed-bug-cve-2014-0160/m-p/32825#M24059</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I would like to know this, too. We need a word on this, anything really. A security company like Palo Alto should be on top of issues like this.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 08 Apr 2014 07:39:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/openssl-heartbleed-bug-cve-2014-0160/m-p/32825#M24059</guid>
      <dc:creator>MijndertS</dc:creator>
      <dc:date>2014-04-08T07:39:32Z</dc:date>
    </item>
    <item>
      <title>Re: OpenSSL Heartbleed bug: CVE-2014-0160</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/openssl-heartbleed-bug-cve-2014-0160/m-p/32826#M24060</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;likewise - are the PAN devices using OpenSSL under the hood for cert creation?&lt;/P&gt;&lt;P&gt;If so, which vers?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I know many of our F5s are "safe" as they run 0.9.8x&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any plans on releasing an update to patch CVE-2014-0160 exploits?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 08 Apr 2014 12:16:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/openssl-heartbleed-bug-cve-2014-0160/m-p/32826#M24060</guid>
      <dc:creator>cramman</dc:creator>
      <dc:date>2014-04-08T12:16:17Z</dc:date>
    </item>
    <item>
      <title>Re: OpenSSL Heartbleed bug: CVE-2014-0160</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/openssl-heartbleed-bug-cve-2014-0160/m-p/32827#M24061</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have tested GP SSL VPN for the heartbleed bug. It seems PANOS 6.0.1 is not vulnerable.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 08 Apr 2014 13:55:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/openssl-heartbleed-bug-cve-2014-0160/m-p/32827#M24061</guid>
      <dc:creator>gafrol</dc:creator>
      <dc:date>2014-04-08T13:55:00Z</dc:date>
    </item>
    <item>
      <title>Re: OpenSSL Heartbleed bug: CVE-2014-0160</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/openssl-heartbleed-bug-cve-2014-0160/m-p/32828#M24062</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I just tested the same against 5.0.10 --&amp;gt; Not vulnerable !&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 08 Apr 2014 14:01:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/openssl-heartbleed-bug-cve-2014-0160/m-p/32828#M24062</guid>
      <dc:creator>gafrol</dc:creator>
      <dc:date>2014-04-08T14:01:09Z</dc:date>
    </item>
    <item>
      <title>Re: OpenSSL Heartbleed bug: CVE-2014-0160</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/openssl-heartbleed-bug-cve-2014-0160/m-p/32829#M24063</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Palo Alto Networks does not use the Open SSL version that has this vulnerability. Please open a support case if you would like to get more info in the coverage for CVE-2014-0160.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Deepak&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 08 Apr 2014 14:18:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/openssl-heartbleed-bug-cve-2014-0160/m-p/32829#M24063</guid>
      <dc:creator>dpalani</dc:creator>
      <dc:date>2014-04-08T14:18:37Z</dc:date>
    </item>
    <item>
      <title>Re: OpenSSL Heartbleed bug: CVE-2014-0160</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/openssl-heartbleed-bug-cve-2014-0160/m-p/32830#M24064</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We really need some kind of a badge or little PA icon indicator next to people that actually work for PA, that are speaking on behalf of the company. I have no idea if &lt;A href="https://live.paloaltonetworks.com/u1/10365"&gt;dpalani&lt;/A&gt; works for PA or not, and whether this is the "official word" or not&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 08 Apr 2014 14:38:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/openssl-heartbleed-bug-cve-2014-0160/m-p/32830#M24064</guid>
      <dc:creator>ericgearhart</dc:creator>
      <dc:date>2014-04-08T14:38:09Z</dc:date>
    </item>
    <item>
      <title>Re: OpenSSL Heartbleed bug: CVE-2014-0160</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/openssl-heartbleed-bug-cve-2014-0160/m-p/32831#M24065</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;agreed, im calling to confirm 100%. this ones a doozy.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 08 Apr 2014 17:18:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/openssl-heartbleed-bug-cve-2014-0160/m-p/32831#M24065</guid>
      <dc:creator>choff123</dc:creator>
      <dc:date>2014-04-08T17:18:17Z</dc:date>
    </item>
    <item>
      <title>Re: OpenSSL Heartbleed bug: CVE-2014-0160</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/openssl-heartbleed-bug-cve-2014-0160/m-p/32832#M24066</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;CVE-2014-0160 is reported on open ssl version 1.0.1 and the firewall uses version 0.9.8, you are more than welcome to open up a case with support and confirm that.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards.&lt;/P&gt;&lt;P&gt;Deepak&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 08 Apr 2014 17:35:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/openssl-heartbleed-bug-cve-2014-0160/m-p/32832#M24066</guid>
      <dc:creator>dpalani</dc:creator>
      <dc:date>2014-04-08T17:35:11Z</dc:date>
    </item>
    <item>
      <title>Re: OpenSSL Heartbleed bug: CVE-2014-0160</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/openssl-heartbleed-bug-cve-2014-0160/m-p/32833#M24067</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Anyone spoken with support about a Vulnerability Protection signature update to catch this?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Or has anyone managed to create a custom signature?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 08 Apr 2014 19:01:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/openssl-heartbleed-bug-cve-2014-0160/m-p/32833#M24067</guid>
      <dc:creator>Dpeters1</dc:creator>
      <dc:date>2014-04-08T19:01:46Z</dc:date>
    </item>
    <item>
      <title>Re: OpenSSL Heartbleed bug: CVE-2014-0160</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/openssl-heartbleed-bug-cve-2014-0160/m-p/32834#M24068</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I would like to know this as well. I was thinking about trying to do this but I think this is big enough Palo Alto should do this if it is possible. This would be great to buy us some time on mitigating this.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 08 Apr 2014 19:50:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/openssl-heartbleed-bug-cve-2014-0160/m-p/32834#M24068</guid>
      <dc:creator>pwebber</dc:creator>
      <dc:date>2014-04-08T19:50:48Z</dc:date>
    </item>
    <item>
      <title>Re: OpenSSL Heartbleed bug: CVE-2014-0160</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/openssl-heartbleed-bug-cve-2014-0160/m-p/32835#M24069</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;PAN-OS is not vulnerable to this bug, as we use an older branch of OpenSSL (0.9.8) which is not affected by this issue.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--Noah&lt;/P&gt;&lt;P&gt;Palo Alto Networks Support&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 08 Apr 2014 20:22:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/openssl-heartbleed-bug-cve-2014-0160/m-p/32835#M24069</guid>
      <dc:creator>NoahMH</dc:creator>
      <dc:date>2014-04-08T20:22:33Z</dc:date>
    </item>
    <item>
      <title>Re: OpenSSL Heartbleed bug: CVE-2014-0160</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/openssl-heartbleed-bug-cve-2014-0160/m-p/32836#M24070</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;STRONG&gt;Is PAN-OS vulnerable?&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PAN-OS is not vulnerable, as we use an older branch of OpenSSL (0.9.8) which is not affected by this issue.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Are Palo Alto Networks public services vulnerable?&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We are in the midst of evaluating our own exposure to CVE-2014-0160 within our public-facing infrastructure, including the update service, WildFire, PAN-DB, public web site, etc.&amp;nbsp; We do not yet have the results of this analysis but we will provide an update once our investigation and remediation is complete.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Does Palo Alto Networks provide IPS coverage for this vulnerability?&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Our threat research team is researching the vulnerability in an effort to provide coverage ASAP.&amp;nbsp; We hope to have coverage released late today, but we cannot commit to a release timeframe until protections are developed and tested.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;What should customers do if they identify vulnerable servers (running OpenSSL 1.0.1 through 1.0.1f)?&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Vulnerable servers should be patched to OpenSSL 1.0.1g (available as of April 7th 2014).&amp;nbsp; SSL private keys should be assumed to be compromised and should be replaced after the OpenSSL patch is in place.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 08 Apr 2014 20:23:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/openssl-heartbleed-bug-cve-2014-0160/m-p/32836#M24070</guid>
      <dc:creator>NoahMH</dc:creator>
      <dc:date>2014-04-08T20:23:29Z</dc:date>
    </item>
    <item>
      <title>Re: OpenSSL Heartbleed bug: CVE-2014-0160</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/openssl-heartbleed-bug-cve-2014-0160/m-p/32837#M24071</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; I was wondering if we could create a vulnerability signature to alert, then setup a rule to block this type of traffic.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 08 Apr 2014 21:07:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/openssl-heartbleed-bug-cve-2014-0160/m-p/32837#M24071</guid>
      <dc:creator>tstores</dc:creator>
      <dc:date>2014-04-08T21:07:30Z</dc:date>
    </item>
    <item>
      <title>Re: OpenSSL Heartbleed bug: CVE-2014-0160</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/openssl-heartbleed-bug-cve-2014-0160/m-p/32838#M24072</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Any update on the timing of the IPS signature release for this?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 09 Apr 2014 05:08:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/openssl-heartbleed-bug-cve-2014-0160/m-p/32838#M24072</guid>
      <dc:creator>chrisp</dc:creator>
      <dc:date>2014-04-09T05:08:51Z</dc:date>
    </item>
    <item>
      <title>Re: OpenSSL Heartbleed bug: CVE-2014-0160</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/openssl-heartbleed-bug-cve-2014-0160/m-p/32839#M24073</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;H1&gt;Application and Threat Content Release Notes&lt;/H1&gt;&lt;H2&gt;Version 429&lt;/H2&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Notes&lt;/STRONG&gt;: A critical vulnerability in OpenSSL (CVE-2014-0160: OpenSSL Private Key Disclosure Vulnerability) was recently disclosed, affecting servers running OpenSSL 1.0.1 through 1.0.1f. This vulnerability allows arbitrary memory readout, which effectively exposes primary key material and compromises the integrity of the secure channel.&lt;/P&gt;&lt;P&gt;To address this vulnerability, Palo Alto Networks has released an emergency content update that provides detection of attempted exploitation of CVE-2014-0160 with IPS vulnerability signature ID 36416 ("OpenSSL TLS Heartbeat Information Disclosure Vulnerability") with critical severity and a default action of block. Palo Alto Networks customers with a Threat Prevention subscription are advised to verify that they are running the latest content version on their devices. If you have any questions about coverage for this advisory, please contact Support. &lt;/P&gt;&lt;H3&gt;Modified Decoders (1)&lt;/H3&gt;&lt;TABLE border="0" cellpadding="0" width="90%"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD style="background: #999999; padding: 1.5pt 1.5pt 1.5pt 1.5pt;" width="71"&gt;&lt;P align="center" style="text-align: center;"&gt;&lt;STRONG style="color: white; font-size: 9.0pt; font-family: 'Tahoma','sans-serif';"&gt;Name&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="background: #EEEEEE; padding: .75pt 3.75pt .75pt 3.75pt;"&gt;&lt;P&gt;&lt;SPAN style="font-size: 9.0pt; font-family: 'Tahoma','sans-serif'; color: #111111;"&gt;ssl&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;H3&gt;New Vulnerability Signatures (1)&lt;/H3&gt;&lt;TABLE border="0" cellpadding="0" width="90%"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD style="background: #999999; padding: 1.5pt 1.5pt 1.5pt 1.5pt;" width="71"&gt;&lt;P align="center" style="text-align: center;"&gt;&lt;STRONG style="color: white; font-size: 9.0pt; font-family: 'Tahoma','sans-serif';"&gt;Severity&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="background: #999999; padding: 1.5pt 1.5pt 1.5pt 1.5pt;" width="71"&gt;&lt;P align="center" style="text-align: center;"&gt;&lt;STRONG style="color: white; font-size: 9.0pt; font-family: 'Tahoma','sans-serif';"&gt;ID&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="background: #999999; padding: 1.5pt 1.5pt 1.5pt 1.5pt;"&gt;&lt;P align="center" style="text-align: center;"&gt;&lt;STRONG style="color: white; font-size: 9.0pt; font-family: 'Tahoma','sans-serif';"&gt;Attack Name&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="background: #999999; padding: 1.5pt 1.5pt 1.5pt 1.5pt;" width="105"&gt;&lt;P align="center" style="text-align: center;"&gt;&lt;STRONG style="color: white; font-size: 9.0pt; font-family: 'Tahoma','sans-serif';"&gt;CVE ID&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="background: #999999; padding: 1.5pt 1.5pt 1.5pt 1.5pt;" width="80"&gt;&lt;P align="center" style="text-align: center;"&gt;&lt;STRONG style="color: white; font-size: 9.0pt; font-family: 'Tahoma','sans-serif';"&gt;Vendor ID&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="background: #999999; padding: 1.5pt 1.5pt 1.5pt 1.5pt;" width="18%"&gt;&lt;P align="center" style="text-align: center;"&gt;&lt;STRONG style="color: white; font-size: 9.0pt; font-family: 'Tahoma','sans-serif';"&gt;Default Action&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="background: #999999; padding: 1.5pt 1.5pt 1.5pt 1.5pt;" width="18%"&gt;&lt;P align="center" style="text-align: center;"&gt;&lt;STRONG style="color: white; font-size: 9.0pt; font-family: 'Tahoma','sans-serif';"&gt;Minimum PAN-OS Version&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="background: #EF3942; padding: .75pt 3.75pt .75pt 3.75pt;"&gt;&lt;P align="center" style="text-align: center;"&gt;&lt;SPAN style="font-size: 9.0pt; font-family: 'Tahoma','sans-serif'; color: #111111;"&gt;critical&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="background: #EEEEEE; padding: .75pt 3.75pt .75pt 3.75pt;"&gt;&lt;P&gt;&lt;SPAN style="font-size: 9.0pt; font-family: 'Tahoma','sans-serif'; color: #111111;"&gt;36416&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="background: #EEEEEE; padding: .75pt 3.75pt .75pt 3.75pt;"&gt;&lt;P&gt;&lt;SPAN style="font-size: 9.0pt; font-family: 'Tahoma','sans-serif'; color: #111111;"&gt;OpenSSL TLS Heartbeat Information Disclosure Vulnerability&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="background: #EEEEEE; padding: .75pt 3.75pt .75pt 3.75pt;"&gt;&lt;P&gt;&lt;SPAN style="font-size: 9.0pt; font-family: 'Tahoma','sans-serif'; color: #111111;"&gt;CVE-2014-0160&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="background: #EEEEEE; padding: .75pt 3.75pt .75pt 3.75pt;"&gt;&lt;P&gt;&lt;SPAN style="font-size: 9.0pt; font-family: 'Tahoma','sans-serif'; color: #111111;"&gt;reset-server&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="background: #EEEEEE; padding: .75pt 3.75pt .75pt 3.75pt;"&gt;&lt;OL style="list-style-type: decimal;"&gt;&lt;LI&gt;&lt;SPAN style="font-size: 9.0pt; font-family: 'Tahoma','sans-serif'; color: #111111;"&gt;3.1.0&lt;/SPAN&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 09 Apr 2014 13:14:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/openssl-heartbleed-bug-cve-2014-0160/m-p/32839#M24073</guid>
      <dc:creator>gafrol</dc:creator>
      <dc:date>2014-04-09T13:14:42Z</dc:date>
    </item>
    <item>
      <title>Re: OpenSSL Heartbleed bug: CVE-2014-0160</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/openssl-heartbleed-bug-cve-2014-0160/m-p/32840#M24074</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;How do you check for ssl version&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 09 Apr 2014 13:36:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/openssl-heartbleed-bug-cve-2014-0160/m-p/32840#M24074</guid>
      <dc:creator>infotech</dc:creator>
      <dc:date>2014-04-09T13:36:18Z</dc:date>
    </item>
    <item>
      <title>Re: OpenSSL Heartbleed bug: CVE-2014-0160</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/openssl-heartbleed-bug-cve-2014-0160/m-p/32841#M24075</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Anyone else not able to get this update to show up in dynamic updates? Or am I missing something?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 09 Apr 2014 14:24:40 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/openssl-heartbleed-bug-cve-2014-0160/m-p/32841#M24075</guid>
      <dc:creator>aglej</dc:creator>
      <dc:date>2014-04-09T14:24:40Z</dc:date>
    </item>
    <item>
      <title>Re: OpenSSL Heartbleed bug: CVE-2014-0160</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/openssl-heartbleed-bug-cve-2014-0160/m-p/32842#M24076</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have installed Application and Threat Content Release 429 but I cannot find the Signature....?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="12722" alt="Capture.JPG.jpg" class="jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/12722_Capture.JPG.jpg" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="12719" alt="Capture.JPG.jpg" class="jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/12719_Capture.JPG.jpg" style="width: 620px; height: 305px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="12720" alt="Capture.JPG.jpg" class="jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/12720_Capture.JPG.jpg" style="width: 620px; height: 307px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="12721" alt="Capture.JPG.jpg" class="jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/12721_Capture.JPG.jpg" style="width: 620px; height: 190px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anyone else ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I just checked on the Dynamic Updates Website on Support, it's not there.... Withdrawal ?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 09 Apr 2014 14:26:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/openssl-heartbleed-bug-cve-2014-0160/m-p/32842#M24076</guid>
      <dc:creator>gafrol</dc:creator>
      <dc:date>2014-04-09T14:26:37Z</dc:date>
    </item>
    <item>
      <title>Re: OpenSSL Heartbleed bug: CVE-2014-0160</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/openssl-heartbleed-bug-cve-2014-0160/m-p/32843#M24077</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Version 429 isn't showing up for me either.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 09 Apr 2014 14:34:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/openssl-heartbleed-bug-cve-2014-0160/m-p/32843#M24077</guid>
      <dc:creator>dbaumann</dc:creator>
      <dc:date>2014-04-09T14:34:05Z</dc:date>
    </item>
  </channel>
</rss>

