OpenSSL

OpenSSL

262 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.35%
  • Published 08.02.2023 20:15:24
  • Last modified 05.05.2025 16:15:24

The public API function BIO_new_NDEF is a helper function used for streaming ASN.1 data via a BIO. It is primarily used internally to OpenSSL to support the SMIME, CMS and PKCS7 streaming capabilities, but may also be called directly by end user appl...

  • EPSS 0.78%
  • Published 08.02.2023 20:15:24
  • Last modified 05.05.2025 16:15:25

An invalid pointer dereference on read can be triggered when an application tries to load malformed PKCS7 data with the d2i_PKCS7(), d2i_PKCS7_bio() or d2i_PKCS7_fp() functions. The result of the dereference is an application crash which could lead ...

  • EPSS 0.45%
  • Published 08.02.2023 20:15:24
  • Last modified 05.05.2025 16:15:25

An invalid pointer dereference on read can be triggered when an application tries to check a malformed DSA public key by the EVP_PKEY_public_check() function. This will most likely lead to an application crash. This function can be called on public k...

  • EPSS 90.05%
  • Published 08.02.2023 20:15:24
  • Last modified 20.03.2025 21:15:16

There is a type confusion vulnerability relating to X.400 address processing inside an X.509 GeneralName. X.400 addresses were parsed as an ASN1_STRING but the public structure definition for GENERAL_NAME incorrectly specified the type of the x400Add...

  • EPSS 0.95%
  • Published 08.02.2023 20:15:24
  • Last modified 05.05.2025 16:15:25

A NULL pointer can be dereferenced when signatures are being verified on PKCS7 signed or signedAndEnveloped data. In case the hash algorithm used for the signature is known to the OpenSSL library but the implementation of the hash algorithm is not av...

  • EPSS 0.23%
  • Published 08.02.2023 20:15:23
  • Last modified 20.03.2025 21:15:14

A timing based side channel exists in the OpenSSL RSA Decryption implementation which could be sufficient to recover a plaintext across a network in a Bleichenbacher style attack. To achieve a successful decryption an attacker would have to be able t...

  • EPSS 0.13%
  • Published 08.02.2023 20:15:23
  • Last modified 05.05.2025 16:15:22

The function PEM_read_bio_ex() reads a PEM file from a BIO and parses and decodes the "name" (e.g. "CERTIFICATE"), any header data and the payload data. If the function succeeds then the "name_out", "header" and "data" arguments are populated with po...

  • EPSS 0.14%
  • Published 13.12.2022 16:15:22
  • Last modified 21.11.2024 07:20:42

If an X.509 certificate contains a malformed policy constraint and policy processing is enabled, then a write lock will be taken twice recursively. On some operating systems (most widely: Windows) this results in a denial of service when the affecte...

  • EPSS 17.01%
  • Published 01.11.2022 18:15:11
  • Last modified 05.05.2025 16:15:20

A buffer overrun can be triggered in X.509 certificate verification, specifically in name constraint checking. Note that this occurs after certificate chain signature verification and requires either a CA to have signed a malicious certificate or for...

  • EPSS 85.38%
  • Published 01.11.2022 18:15:10
  • Last modified 05.05.2025 16:15:19

A buffer overrun can be triggered in X.509 certificate verification, specifically in name constraint checking. Note that this occurs after certificate chain signature verification and requires either a CA to have signed the malicious certificate or f...