OpenSSL

OpenSSL

262 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 4.4%
  • Veröffentlicht 03.09.2024 16:15:07
  • Zuletzt bearbeitet 03.06.2025 10:51:54

Issue summary: Applications performing certificate name checks (e.g., TLS clients checking server certificates) may attempt to read an invalid memory address resulting in abnormal termination of the application process. Impact summary: Abnormal term...

  • EPSS 7.84%
  • Veröffentlicht 27.06.2024 11:15:24
  • Zuletzt bearbeitet 01.09.2025 09:15:34

Issue summary: Calling the OpenSSL API function SSL_select_next_proto with an empty supported client protocols buffer may cause a crash or memory contents to be sent to the peer. Impact summary: A buffer overread can have a range of potential conseq...

  • EPSS 0.09%
  • Veröffentlicht 16.05.2024 16:15:10
  • Zuletzt bearbeitet 21.11.2024 09:43:11

Issue summary: Checking excessively long DSA keys or parameters may be very slow. Impact summary: Applications that use the functions EVP_PKEY_param_check() or EVP_PKEY_public_check() to check a DSA public key or DSA parameters may experience long d...

  • EPSS 0.63%
  • Veröffentlicht 14.05.2024 15:08:51
  • Zuletzt bearbeitet 26.09.2025 19:19:49

iPerf3 before 3.17, when used with OpenSSL before 3.2.0 as a server with RSA authentication, allows a timing side channel in RSA decryption operations. This side channel could be sufficient for an attacker to recover credential plaintext. It requires...

  • EPSS 0.52%
  • Veröffentlicht 25.04.2024 07:15:45
  • Zuletzt bearbeitet 21.11.2024 08:43:25

Issue summary: Checking excessively long invalid RSA public keys may take a long time. Impact summary: Applications that use the function EVP_PKEY_public_check() to check RSA public keys may experience long delays. Where the key that is being checke...

  • EPSS 2.12%
  • Veröffentlicht 08.04.2024 14:15:07
  • Zuletzt bearbeitet 28.03.2025 20:15:22

Issue summary: Some non-default TLS server configurations can cause unbounded memory growth when processing TLSv1.3 sessions Impact summary: An attacker may exploit certain server configurations to trigger unbounded memory growth that would lead to ...

  • EPSS 0.22%
  • Veröffentlicht 26.01.2024 09:15:07
  • Zuletzt bearbeitet 29.05.2025 16:15:31

Issue summary: Processing a maliciously formatted PKCS12 file may lead OpenSSL to crash leading to a potential Denial of Service attack Impact summary: Applications loading files in the PKCS12 format from untrusted sources might terminate abruptly. ...

  • EPSS 1.86%
  • Veröffentlicht 09.01.2024 17:15:12
  • Zuletzt bearbeitet 20.06.2025 16:15:27

Issue summary: The POLY1305 MAC (message authentication code) implementation contains a bug that might corrupt the internal state of applications running on PowerPC CPU based platforms if the CPU provides vector instructions. Impact summary: If an a...

  • EPSS 0.12%
  • Veröffentlicht 06.11.2023 16:15:42
  • Zuletzt bearbeitet 21.11.2024 08:42:15

Issue summary: Generating excessively long X9.42 DH keys or checking excessively long X9.42 DH keys or parameters may be very slow. Impact summary: Applications that use the functions DH_generate_key() to generate an X9.42 DH key may experience long...

  • EPSS 2%
  • Veröffentlicht 25.10.2023 18:17:43
  • Zuletzt bearbeitet 21.11.2024 08:41:36

Issue summary: A bug has been identified in the processing of key and initialisation vector (IV) lengths. This can lead to potential truncation or overruns during the initialisation of some symmetric ciphers. Impact summary: A truncation in the IV ...