CVE-2008-1672
- EPSS 21.26%
- Veröffentlicht 29.05.2008 16:32:00
- Zuletzt bearbeitet 09.04.2025 00:30:58
OpenSSL 0.9.8f and 0.9.8g allows remote attackers to cause a denial of service (crash) via a TLS handshake that omits the Server Key Exchange message and uses "particular cipher suites," which triggers a NULL pointer dereference.
CVE-2008-0166
- EPSS 4.09%
- Veröffentlicht 13.05.2008 17:20:00
- Zuletzt bearbeitet 09.04.2025 00:30:58
OpenSSL 0.9.8c-1 up to versions before 0.9.8g-9 on Debian-based operating systems uses a random number generator that generates predictable numbers, which makes it easier for remote attackers to conduct brute force guessing attacks against cryptograp...
CVE-2007-4995
- EPSS 9.18%
- Veröffentlicht 13.10.2007 01:17:00
- Zuletzt bearbeitet 09.04.2025 00:30:58
Off-by-one error in the DTLS implementation in OpenSSL 0.9.8 before 0.9.8f allows remote attackers to execute arbitrary code via unspecified vectors.
CVE-2007-5135
- EPSS 30.64%
- Veröffentlicht 27.09.2007 20:17:00
- Zuletzt bearbeitet 09.04.2025 00:30:58
Off-by-one error in the SSL_get_shared_ciphers function in OpenSSL 0.9.7 up to 0.9.7l, and 0.9.8 up to 0.9.8f, might allow remote attackers to execute arbitrary code via a crafted packet that triggers a one-byte buffer underflow. NOTE: this issue wa...
CVE-2007-3108
- EPSS 0.09%
- Veröffentlicht 08.08.2007 01:17:00
- Zuletzt bearbeitet 09.04.2025 00:30:58
The BN_from_montgomery function in crypto/bn/bn_mont.c in OpenSSL 0.9.8e and earlier does not properly perform Montgomery multiplication, which might allow local users to conduct a side-channel attack and retrieve RSA private keys.
CVE-2006-2937
- EPSS 5.75%
- Veröffentlicht 28.09.2006 18:07:00
- Zuletzt bearbeitet 09.04.2025 00:30:58
OpenSSL 0.9.7 before 0.9.7l and 0.9.8 before 0.9.8d allows remote attackers to cause a denial of service (infinite loop and memory consumption) via malformed ASN.1 structures that trigger an improperly handled error condition.
CVE-2006-2940
- EPSS 16.49%
- Veröffentlicht 28.09.2006 18:07:00
- Zuletzt bearbeitet 09.04.2025 00:30:58
OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions allows attackers to cause a denial of service (CPU consumption) via parasitic public keys with large (1) "public exponent" or (2) "public modulus" values in X.509 certificates tha...
- EPSS 34.76%
- Veröffentlicht 28.09.2006 18:07:00
- Zuletzt bearbeitet 09.04.2025 00:30:58
Buffer overflow in the SSL_get_shared_ciphers function in OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions has unspecified impact and remote attack vectors involving a long list of ciphers.
CVE-2006-4343
- EPSS 7.85%
- Veröffentlicht 28.09.2006 18:07:00
- Zuletzt bearbeitet 09.04.2025 00:30:58
The get_server_hello function in the SSLv2 client code in OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions allows remote servers to cause a denial of service (client crash) via unknown vectors that trigger a null pointer derefer...
CVE-2006-4339
- EPSS 8.43%
- Veröffentlicht 05.09.2006 17:04:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
OpenSSL before 0.9.7, 0.9.7 before 0.9.7k, and 0.9.8 before 0.9.8c, when using an RSA key with exponent 3, removes PKCS-1 padding before generating a hash, which allows remote attackers to forge a PKCS #1 v1.5 signature that is signed by that RSA key...