OpenSSL

OpenSSL

262 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 56.01%
  • Veröffentlicht 23.12.2013 22:55:03
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The ssl_get_algorithm2 function in ssl/s3_lib.c in OpenSSL before 1.0.2 obtains a certain version number from an incorrect data structure, which allows remote attackers to cause a denial of service (daemon crash) via crafted traffic from a TLS 1.2 cl...

  • EPSS 1.08%
  • Veröffentlicht 08.02.2013 19:55:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The TLS protocol 1.1 and 1.2 and the DTLS protocol 1.0 and 1.2, as used in OpenSSL, OpenJDK, PolarSSL, and other products, do not properly consider timing side-channel attacks on a MAC check requirement during the processing of malformed CBC padding,...

  • EPSS 55.99%
  • Veröffentlicht 08.02.2013 19:55:00
  • Zuletzt bearbeitet 11.04.2025 00:51:21

crypto/evp/e_aes_cbc_hmac_sha1.c in the AES-NI functionality in the TLS 1.1 and 1.2 implementations in OpenSSL 1.0.1 before 1.0.1d allows remote attackers to cause a denial of service (application crash) via crafted CBC data.

  • EPSS 5.33%
  • Veröffentlicht 08.02.2013 19:55:00
  • Zuletzt bearbeitet 11.04.2025 00:51:21

OpenSSL before 0.9.8y, 1.0.0 before 1.0.0k, and 1.0.1 before 1.0.1d does not properly perform signature verification for OCSP responses, which allows remote OCSP servers to cause a denial of service (NULL pointer dereference and application crash) vi...

  • EPSS 0.37%
  • Veröffentlicht 20.06.2012 17:55:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The Diffie-Hellman key-exchange implementation in OpenSSL 0.9.8, when FIPS mode is enabled, does not properly validate a public parameter, which makes it easier for man-in-the-middle attackers to obtain the shared secret key by modifying network traf...

  • EPSS 85.62%
  • Veröffentlicht 16.06.2012 21:55:02
  • Zuletzt bearbeitet 11.04.2025 00:51:21

OpenSSL before 0.9.8l, and 0.9.8m through 1.x, does not properly restrict client-initiated renegotiation within the SSL and TLS protocols, which might make it easier for remote attackers to cause a denial of service (CPU consumption) by performing ma...

  • EPSS 12.29%
  • Veröffentlicht 14.05.2012 22:55:03
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Integer underflow in OpenSSL before 0.9.8x, 1.0.0 before 1.0.0j, and 1.0.1 before 1.0.1c, when TLS 1.1, TLS 1.2, or DTLS is used with CBC encryption, allows remote attackers to cause a denial of service (buffer over-read) or possibly have unspecified...

  • EPSS 6.68%
  • Veröffentlicht 24.04.2012 20:55:02
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Multiple integer signedness errors in crypto/buffer/buffer.c in OpenSSL 0.9.8v allow remote attackers to conduct buffer overflow attacks, and cause a denial of service (memory corruption) or possibly have unspecified other impact, via crafted DER dat...

Exploit
  • EPSS 6.28%
  • Veröffentlicht 19.04.2012 17:55:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The asn1_d2i_read_bio function in crypto/asn1/a_d2i_fp.c in OpenSSL before 0.9.8v, 1.0.0 before 1.0.0i, and 1.0.1 before 1.0.1a does not properly interpret integer data, which allows remote attackers to conduct buffer overflow attacks, and cause a de...

  • EPSS 6.97%
  • Veröffentlicht 15.03.2012 17:55:00
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The mime_param_cmp function in crypto/asn1/asn_mime.c in OpenSSL before 0.9.8u and 1.x before 1.0.0h allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted S/MIME message, a different vulne...