CVE-2016-8610
- EPSS 71.13%
- Veröffentlicht 13.11.2017 22:29:00
- Zuletzt bearbeitet 20.04.2025 01:37:25
A denial of service flaw was found in OpenSSL 0.9.8, 1.0.1, 1.0.2 through 1.0.2h, and 1.1.0 in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL ser...
CVE-2017-3736
- EPSS 6.72%
- Veröffentlicht 02.11.2017 17:29:00
- Zuletzt bearbeitet 20.04.2025 01:37:25
There is a carry propagating bug in the x86_64 Montgomery squaring procedure in OpenSSL before 1.0.2m and 1.1.0 before 1.1.0g. No EC algorithms are affected. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very ...
CVE-2017-3735
- EPSS 34.54%
- Veröffentlicht 28.08.2017 19:29:01
- Zuletzt bearbeitet 20.04.2025 01:37:25
While parsing an IPAddressFamily extension in an X.509 certificate, it is possible to do a one-byte overread. This would result in an incorrect text display of the certificate. This bug has been present since 2006 and is present in all versions of Op...
CVE-2016-7055
- EPSS 2%
- Veröffentlicht 04.05.2017 20:29:00
- Zuletzt bearbeitet 20.04.2025 01:37:25
There is a carry propagating bug in the Broadwell-specific Montgomery multiplication procedure in OpenSSL 1.0.2 and 1.1.0 before 1.1.0c that handles input lengths divisible by, but longer than 256 bits. Analysis suggests that attacks against RSA, DSA...
CVE-2016-7053
- EPSS 4.2%
- Veröffentlicht 04.05.2017 19:29:00
- Zuletzt bearbeitet 20.04.2025 01:37:25
In OpenSSL 1.1.0 before 1.1.0c, applications parsing invalid CMS structures can crash with a NULL pointer dereference. This is caused by a bug in the handling of the ASN.1 CHOICE type in OpenSSL 1.1.0 which can result in a NULL value being passed to ...
CVE-2016-7054
- EPSS 16.51%
- Veröffentlicht 04.05.2017 19:29:00
- Zuletzt bearbeitet 20.04.2025 01:37:25
In OpenSSL 1.1.0 before 1.1.0c, TLS connections using *-CHACHA20-POLY1305 ciphersuites are susceptible to a DoS attack by corrupting larger payloads. This can result in an OpenSSL crash. This issue is not considered to be exploitable beyond a DoS.
CVE-2017-3730
- EPSS 41.7%
- Veröffentlicht 04.05.2017 19:29:00
- Zuletzt bearbeitet 20.04.2025 01:37:25
In OpenSSL 1.1.0 before 1.1.0d, if a malicious server supplies bad parameters for a DHE or ECDHE key exchange then this can result in the client attempting to dereference a NULL pointer leading to a client crash. This could be exploited in a Denial o...
CVE-2017-3731
- EPSS 10.4%
- Veröffentlicht 04.05.2017 19:29:00
- Zuletzt bearbeitet 20.04.2025 01:37:25
If an SSL/TLS server or client is running on a 32-bit host, and a specific cipher is being used, then a truncated packet can cause that server or client to perform an out-of-bounds read, usually resulting in a crash. For OpenSSL 1.1.0, the crash can ...
CVE-2017-3732
- EPSS 7.58%
- Veröffentlicht 04.05.2017 19:29:00
- Zuletzt bearbeitet 20.04.2025 01:37:25
There is a carry propagating bug in the x86_64 Montgomery squaring procedure in OpenSSL 1.0.2 before 1.0.2k and 1.1.0 before 1.1.0d. No EC algorithms are affected. Analysis suggests that attacks against RSA and DSA as a result of this defect would be...
CVE-2017-3733
- EPSS 5.89%
- Veröffentlicht 04.05.2017 19:29:00
- Zuletzt bearbeitet 20.04.2025 01:37:25
During a renegotiation handshake if the Encrypt-Then-Mac extension is negotiated where it was not in the original handshake (or vice-versa) then this can cause OpenSSL 1.1.0 before 1.1.0e to crash (dependent on ciphersuite). Both clients and servers ...