CVE-2020-1967
- EPSS 66.69%
- Published 21.04.2020 14:15:11
- Last modified 21.11.2024 05:11:45
Server or client applications that call the SSL_check_chain() function during or after a TLS 1.3 handshake may crash due to a NULL pointer dereference as a result of incorrect handling of the "signature_algorithms_cert" TLS extension. The crash occur...
CVE-2019-1551
- EPSS 4.53%
- Published 06.12.2019 18:15:12
- Last modified 21.11.2024 04:36:48
There is an overflow bug in the x64_64 Montgomery squaring procedure used in exponentiation with 512-bit moduli. No EC algorithms are affected. Analysis suggests that attacks against 2-prime RSA1024, 3-prime RSA1536, and DSA1024 as a result of this d...
CVE-2019-1547
- EPSS 0.16%
- Published 10.09.2019 17:15:11
- Last modified 21.11.2024 04:36:48
Normally in OpenSSL EC groups always have a co-factor present and this is used in side channel resistant code paths. However, in some cases, it is possible to construct a group using explicit parameters (instead of using a named curve). In those case...
CVE-2019-1549
- EPSS 1.36%
- Published 10.09.2019 17:15:11
- Last modified 21.11.2024 04:36:48
OpenSSL 1.1.1 introduced a rewritten random number generator (RNG). This was intended to include protection in the event of a fork() system call in order to ensure that the parent and child processes did not share the same RNG state. However this pro...
CVE-2019-1563
- EPSS 1.42%
- Published 10.09.2019 17:15:11
- Last modified 21.11.2024 04:36:49
In situations where an attacker receives automated notification of the success or failure of a decryption attempt an attacker, after sending a very large number of messages to be decrypted, can recover a CMS/PKCS7 transported encryption key or decryp...
CVE-2019-1552
- EPSS 0.17%
- Published 30.07.2019 17:15:12
- Last modified 21.11.2024 04:36:48
OpenSSL has internal defaults for a directory tree where it can find a configuration file as well as certificates used for verification in TLS. This directory is most commonly referred to as OPENSSLDIR, and is configurable with the --prefix / --opens...
CVE-2019-1543
- EPSS 3.63%
- Published 06.03.2019 21:29:00
- Last modified 21.11.2024 04:36:47
ChaCha20-Poly1305 is an AEAD cipher, and requires a unique nonce input for every encryption operation. RFC 7539 specifies that the nonce value (IV) should be 96 bits (12 bytes). OpenSSL allows a variable nonce length and front pads the nonce with 0 b...
CVE-2019-1559
- EPSS 5.05%
- Published 27.02.2019 23:29:00
- Last modified 21.11.2024 04:36:48
If an application encounters a fatal protocol error and then calls SSL_shutdown() twice (once to send a close_notify, and once to receive one) then OpenSSL can respond differently to the calling application if a 0 byte record is received with invalid...
CVE-2018-5407
- EPSS 0.64%
- Published 15.11.2018 21:29:00
- Last modified 21.11.2024 04:08:45
Simultaneous Multi-threading (SMT) in processors can enable local users to exploit software vulnerable to timing attacks via a side-channel timing attack on 'port contention'.
CVE-2018-0734
- EPSS 6.05%
- Published 30.10.2018 12:29:00
- Last modified 21.11.2024 03:38:50
The OpenSSL DSA signature algorithm has been shown to be vulnerable to a timing side channel attack. An attacker could use variations in the signing algorithm to recover the private key. Fixed in OpenSSL 1.1.1a (Affected 1.1.1). Fixed in OpenSSL 1.1....