CVE-2014-0224
- EPSS 92.69%
- Veröffentlicht 05.06.2014 21:55:07
- Zuletzt bearbeitet 12.04.2025 10:46:40
OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly restrict processing of ChangeCipherSpec messages, which allows man-in-the-middle attackers to trigger use of a zero-length master key in certain OpenSSL-to-OpenSSL...
CVE-2014-3470
- EPSS 91.4%
- Veröffentlicht 05.06.2014 21:55:07
- Zuletzt bearbeitet 12.04.2025 10:46:40
The ssl3_send_client_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h, when an anonymous ECDH cipher suite is used, allows remote attackers to cause a denial of service (NULL pointer dereferen...
CVE-2014-0195
- EPSS 90.91%
- Veröffentlicht 05.06.2014 21:55:06
- Zuletzt bearbeitet 12.04.2025 10:46:40
The dtls1_reassemble_fragment function in d1_both.c in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly validate fragment lengths in DTLS ClientHello messages, which allows remote attackers to execute arbitrary c...
CVE-2014-0221
- EPSS 82.1%
- Veröffentlicht 05.06.2014 21:55:06
- Zuletzt bearbeitet 12.04.2025 10:46:40
The dtls1_get_message_fragment function in d1_both.c in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h allows remote attackers to cause a denial of service (recursion and client crash) via a DTLS hello message in an invalid DTLS...
CVE-2014-0198
- EPSS 30.89%
- Veröffentlicht 06.05.2014 10:44:05
- Zuletzt bearbeitet 12.04.2025 10:46:40
The do_ssl3_write function in s3_pkt.c in OpenSSL 1.x through 1.0.1g, when SSL_MODE_RELEASE_BUFFERS is enabled, does not properly manage a buffer pointer during certain recursive calls, which allows remote attackers to cause a denial of service (NULL...
- EPSS 14.64%
- Veröffentlicht 14.04.2014 22:38:08
- Zuletzt bearbeitet 12.04.2025 10:46:40
Race condition in the ssl3_read_bytes function in s3_pkt.c in OpenSSL through 1.0.1g, when SSL_MODE_RELEASE_BUFFERS is enabled, allows remote attackers to inject data across sessions or cause a denial of service (use-after-free and parsing error) via...
CVE-2014-0160
- EPSS 94.48%
- Veröffentlicht 07.04.2014 22:55:03
- Zuletzt bearbeitet 12.04.2025 10:46:40
The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before 1.0.1g do not properly handle Heartbeat Extension packets, which allows remote attackers to obtain sensitive information from process memory via crafted packets that trigger a buffer ov...
CVE-2014-0076
- EPSS 0.54%
- Veröffentlicht 25.03.2014 13:25:21
- Zuletzt bearbeitet 12.04.2025 10:46:40
The Montgomery ladder implementation in OpenSSL through 1.0.0l does not ensure that certain swap operations have a constant-time behavior, which makes it easier for local users to obtain ECDSA nonces via a FLUSH+RELOAD cache side-channel attack.
CVE-2013-4353
- EPSS 42.18%
- Veröffentlicht 09.01.2014 01:55:03
- Zuletzt bearbeitet 11.04.2025 00:51:21
The ssl3_take_mac function in ssl/s3_both.c in OpenSSL 1.0.1 before 1.0.1f allows remote TLS servers to cause a denial of service (NULL pointer dereference and application crash) via a crafted Next Protocol Negotiation record in a TLS handshake.
CVE-2013-6450
- EPSS 35.97%
- Veröffentlicht 01.01.2014 16:05:15
- Zuletzt bearbeitet 11.04.2025 00:51:21
The DTLS retransmission implementation in OpenSSL 1.0.0 before 1.0.0l and 1.0.1 before 1.0.1f does not properly maintain data structures for digest and encryption contexts, which might allow man-in-the-middle attackers to trigger the use of a differe...