OpenSSL

OpenSSL

274 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 2.28%
  • Veröffentlicht 07.07.2015 10:59:00
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Race condition in a certain Red Hat patch to the PRNG lock implementation in the ssleay_rand_bytes function in OpenSSL, as distributed in openssl-1.0.1e-25.el7 in Red Hat Enterprise Linux (RHEL) 7 and other products, allows remote attackers to cause ...

  • EPSS 11.7%
  • Veröffentlicht 12.06.2015 19:59:05
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The do_free_upto function in crypto/cms/cms_smime.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b allows remote attackers to cause a denial of service (infinite loop) via vectors that trigger a NULL valu...

  • EPSS 10.25%
  • Veröffentlicht 12.06.2015 19:59:04
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Race condition in the ssl3_get_new_session_ticket function in ssl/s3_clnt.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b, when used for a multi-threaded client, allows remote attackers to cause a denial...

  • EPSS 11.77%
  • Veröffentlicht 12.06.2015 19:59:03
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The PKCS7_dataDecodefunction in crypto/pkcs7/pk7_doit.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b allows remote attackers to cause a denial of service (NULL pointer dereference and application crash)...

  • EPSS 3.27%
  • Veröffentlicht 12.06.2015 19:59:02
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The X509_cmp_time function in crypto/x509/x509_vfy.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a cr...

  • EPSS 15.28%
  • Veröffentlicht 12.06.2015 19:59:01
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The BN_GF2m_mod_inv function in crypto/bn/bn_gf2m.c in OpenSSL before 0.9.8s, 1.0.0 before 1.0.0e, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b does not properly handle ECParameters structures in which the curve is over a malformed binary polynomial ...

Exploit
  • EPSS 23.78%
  • Veröffentlicht 12.06.2015 19:59:00
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The dtls1_clear_queues function in ssl/d1_lib.c in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h frees data structures without considering that application data can arrive between a ChangeCipherSpec message and a Finished messa...

  • EPSS 93.9%
  • Veröffentlicht 21.05.2015 00:59:00
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The TLS protocol 1.2 and earlier, when a DHE_EXPORT ciphersuite is enabled on a server but not on a client, does not properly convey a DHE_EXPORT choice, which allows man-in-the-middle attackers to conduct cipher-downgrade attacks by rewriting a Clie...

  • EPSS 14.94%
  • Veröffentlicht 19.03.2015 22:59:12
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The ssl3_get_client_key_exchange function in s3_srvr.c in OpenSSL 1.0.2 before 1.0.2a, when client authentication and an ephemeral Diffie-Hellman ciphersuite are enabled, allows remote attackers to cause a denial of service (daemon crash) via a Clien...

  • EPSS 8.36%
  • Veröffentlicht 19.03.2015 22:59:11
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The SSLv2 implementation in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a allows remote attackers to cause a denial of service (s2_lib.c assertion failure and daemon exit) via a crafted CLIENT-MASTER-KEY me...