CVE-2016-0704
- EPSS 5.99%
- Veröffentlicht 02.03.2016 11:59:01
- Zuletzt bearbeitet 12.04.2025 10:46:40
An oracle protection mechanism in the get_client_master_key function in s2_srvr.c in the SSLv2 implementation in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a overwrites incorrect MASTER-KEY bytes during us...
CVE-2016-0703
- EPSS 3.68%
- Veröffentlicht 02.03.2016 11:59:00
- Zuletzt bearbeitet 12.04.2025 10:46:40
The get_client_master_key function in s2_srvr.c in the SSLv2 implementation in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a accepts a nonzero CLIENT-MASTER-KEY CLEAR-KEY-LENGTH value for an arbitrary ciphe...
CVE-2016-0800
- EPSS 90.03%
- Veröffentlicht 01.03.2016 20:59:00
- Zuletzt bearbeitet 12.04.2025 10:46:40
The SSLv2 protocol, as used in OpenSSL before 1.0.1s and 1.0.2 before 1.0.2g and other products, requires a server to send a ServerVerify message before establishing that a client possesses certain plaintext RSA data, which makes it easier for remote...
CVE-2016-0701
- EPSS 39.52%
- Veröffentlicht 15.02.2016 02:59:18
- Zuletzt bearbeitet 12.04.2025 10:46:40
The DH_check_pub_key function in crypto/dh/dh_check.c in OpenSSL 1.0.2 before 1.0.2f does not ensure that prime numbers are appropriate for Diffie-Hellman (DH) key exchange, which makes it easier for remote attackers to discover a private DH exponent...
CVE-2015-3197
- EPSS 21.95%
- Veröffentlicht 15.02.2016 02:59:01
- Zuletzt bearbeitet 12.04.2025 10:46:40
ssl/s2_srvr.c in OpenSSL 1.0.1 before 1.0.1r and 1.0.2 before 1.0.2f does not prevent use of disabled ciphers, which makes it easier for man-in-the-middle attackers to defeat cryptographic protection mechanisms by performing computations on SSLv2 tra...
CVE-2015-3196
- EPSS 7.44%
- Veröffentlicht 06.12.2015 20:59:06
- Zuletzt bearbeitet 12.04.2025 10:46:40
ssl/s3_clnt.c in OpenSSL 1.0.0 before 1.0.0t, 1.0.1 before 1.0.1p, and 1.0.2 before 1.0.2d, when used for a multi-threaded client, writes the PSK identity hint to an incorrect data structure, which allows remote servers to cause a denial of service (...
CVE-2015-3195
- EPSS 3.48%
- Veröffentlicht 06.12.2015 20:59:05
- Zuletzt bearbeitet 12.04.2025 10:46:40
The ASN1_TFLG_COMBINE implementation in crypto/asn1/tasn_dec.c in OpenSSL before 0.9.8zh, 1.0.0 before 1.0.0t, 1.0.1 before 1.0.1q, and 1.0.2 before 1.0.2e mishandles errors caused by malformed X509_ATTRIBUTE data, which allows remote attackers to ob...
CVE-2015-3194
- EPSS 58.14%
- Veröffentlicht 06.12.2015 20:59:04
- Zuletzt bearbeitet 12.04.2025 10:46:40
crypto/rsa/rsa_ameth.c in OpenSSL 1.0.1 before 1.0.1q and 1.0.2 before 1.0.2e allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an RSA PSS ASN.1 signature that lacks a mask generation function p...
CVE-2015-3193
- EPSS 23.63%
- Veröffentlicht 06.12.2015 20:59:02
- Zuletzt bearbeitet 12.04.2025 10:46:40
The Montgomery squaring implementation in crypto/bn/asm/x86_64-mont5.pl in OpenSSL 1.0.2 before 1.0.2e on the x86_64 platform, as used by the BN_mod_exp function, mishandles carry propagation and produces incorrect output, which makes it easier for r...
- EPSS 9.85%
- Veröffentlicht 06.12.2015 20:59:00
- Zuletzt bearbeitet 12.04.2025 10:46:40
The ssl3_get_key_exchange function in ssl/s3_clnt.c in OpenSSL 1.0.2 before 1.0.2e allows remote servers to cause a denial of service (segmentation fault) via a zero p value in an anonymous Diffie-Hellman (DH) ServerKeyExchange message.