OpenSSL

OpenSSL

262 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 21.26%
  • Veröffentlicht 29.05.2008 16:32:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

OpenSSL 0.9.8f and 0.9.8g allows remote attackers to cause a denial of service (crash) via a TLS handshake that omits the Server Key Exchange message and uses "particular cipher suites," which triggers a NULL pointer dereference.

Exploit
  • EPSS 4.09%
  • Veröffentlicht 13.05.2008 17:20:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

OpenSSL 0.9.8c-1 up to versions before 0.9.8g-9 on Debian-based operating systems uses a random number generator that generates predictable numbers, which makes it easier for remote attackers to conduct brute force guessing attacks against cryptograp...

  • EPSS 9.18%
  • Veröffentlicht 13.10.2007 01:17:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Off-by-one error in the DTLS implementation in OpenSSL 0.9.8 before 0.9.8f allows remote attackers to execute arbitrary code via unspecified vectors.

  • EPSS 30.64%
  • Veröffentlicht 27.09.2007 20:17:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Off-by-one error in the SSL_get_shared_ciphers function in OpenSSL 0.9.7 up to 0.9.7l, and 0.9.8 up to 0.9.8f, might allow remote attackers to execute arbitrary code via a crafted packet that triggers a one-byte buffer underflow. NOTE: this issue wa...

  • EPSS 0.09%
  • Veröffentlicht 08.08.2007 01:17:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

The BN_from_montgomery function in crypto/bn/bn_mont.c in OpenSSL 0.9.8e and earlier does not properly perform Montgomery multiplication, which might allow local users to conduct a side-channel attack and retrieve RSA private keys.

  • EPSS 5.75%
  • Veröffentlicht 28.09.2006 18:07:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

OpenSSL 0.9.7 before 0.9.7l and 0.9.8 before 0.9.8d allows remote attackers to cause a denial of service (infinite loop and memory consumption) via malformed ASN.1 structures that trigger an improperly handled error condition.

  • EPSS 16.49%
  • Veröffentlicht 28.09.2006 18:07:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions allows attackers to cause a denial of service (CPU consumption) via parasitic public keys with large (1) "public exponent" or (2) "public modulus" values in X.509 certificates tha...

  • EPSS 34.76%
  • Veröffentlicht 28.09.2006 18:07:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Buffer overflow in the SSL_get_shared_ciphers function in OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions has unspecified impact and remote attack vectors involving a long list of ciphers.

  • EPSS 7.85%
  • Veröffentlicht 28.09.2006 18:07:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

The get_server_hello function in the SSLv2 client code in OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions allows remote servers to cause a denial of service (client crash) via unknown vectors that trigger a null pointer derefer...

  • EPSS 8.43%
  • Veröffentlicht 05.09.2006 17:04:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

OpenSSL before 0.9.7, 0.9.7 before 0.9.7k, and 0.9.8 before 0.9.8c, when using an RSA key with exponent 3, removes PKCS-1 padding before generating a hash, which allows remote attackers to forge a PKCS #1 v1.5 signature that is signed by that RSA key...