CVE-2024-2467
- EPSS 0.08%
- Published 25.04.2024 17:15:49
- Last modified 21.11.2024 09:09:49
A timing-based side-channel flaw exists in the perl-Crypt-OpenSSL-RSA package, which could be sufficient to recover plaintext across a network in a Bleichenbacher-style attack. To achieve successful decryption, an attacker would have to be able to se...
- EPSS 5.33%
- Published 08.02.2013 19:55:00
- Last modified 11.04.2025 00:51:21
OpenSSL before 0.9.8y, 1.0.0 before 1.0.0k, and 1.0.1 before 1.0.1d does not properly perform signature verification for OCSP responses, which allows remote OCSP servers to cause a denial of service (NULL pointer dereference and application crash) vi...
CVE-2012-2333
- EPSS 12.29%
- Published 14.05.2012 22:55:03
- Last modified 11.04.2025 00:51:21
Integer underflow in OpenSSL before 0.9.8x, 1.0.0 before 1.0.0j, and 1.0.1 before 1.0.1c, when TLS 1.1, TLS 1.2, or DTLS is used with CBC encryption, allows remote attackers to cause a denial of service (buffer over-read) or possibly have unspecified...
CVE-2012-2110
- EPSS 6.28%
- Published 19.04.2012 17:55:01
- Last modified 11.04.2025 00:51:21
The asn1_d2i_read_bio function in crypto/asn1/a_d2i_fp.c in OpenSSL before 0.9.8v, 1.0.0 before 1.0.0i, and 1.0.1 before 1.0.1a does not properly interpret integer data, which allows remote attackers to conduct buffer overflow attacks, and cause a de...
- EPSS 14.53%
- Published 14.01.2010 19:30:00
- Last modified 09.04.2025 00:30:58
Memory leak in the zlib_stateful_finish function in crypto/comp/c_zlib.c in OpenSSL 0.9.8l and earlier and 1.0.0 Beta through Beta 4 allows remote attackers to cause a denial of service (memory consumption) via vectors that trigger incorrect calls to...
- EPSS 42.63%
- Published 04.06.2009 16:30:00
- Last modified 09.04.2025 00:30:58
ssl/s3_pkt.c in OpenSSL before 0.9.8i allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a DTLS ChangeCipherSpec packet that occurs before ClientHello.
- EPSS 14.15%
- Published 04.06.2009 16:30:00
- Last modified 09.04.2025 00:30:58
The dtls1_retrieve_buffered_fragment function in ssl/d1_both.c in OpenSSL before 1.0.0 Beta 2 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via an out-of-sequence DTLS handshake message, related to a...
CVE-2004-0079
- EPSS 2.06%
- Published 23.11.2004 05:00:00
- Last modified 03.04.2025 01:03:51
The do_change_cipher_spec function in OpenSSL 0.9.6c to 0.9.6k, and 0.9.7a to 0.9.7c, allows remote attackers to cause a denial of service (crash) via a crafted SSL/TLS handshake that triggers a null dereference.
- EPSS 2.27%
- Published 23.11.2004 05:00:00
- Last modified 03.04.2025 01:03:51
OpenSSL 0.9.6 before 0.9.6d does not properly handle unknown message types, which allows remote attackers to cause a denial of service (infinite loop), as demonstrated using the Codenomicon TLS Test Tool.
- EPSS 0.67%
- Published 23.11.2004 05:00:00
- Last modified 03.04.2025 01:03:51
The SSL/TLS handshaking code in OpenSSL 0.9.7a, 0.9.7b, and 0.9.7c, when using Kerberos ciphersuites, does not properly check the length of Kerberos tickets during a handshake, which allows remote attackers to cause a denial of service (crash) via a ...