OpenSSL

OpenSSL

262 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 12.14%
  • Veröffentlicht 09.01.2015 02:59:11
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The ssl3_get_cert_verify function in s3_srvr.c in OpenSSL 1.0.0 before 1.0.0p and 1.0.1 before 1.0.1k accepts client authentication with a Diffie-Hellman (DH) certificate without requiring a CertificateVerify message, which allows remote attackers to...

  • EPSS 91.95%
  • Veröffentlicht 09.01.2015 02:59:10
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The ssl3_get_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote SSL servers to conduct RSA-to-EXPORT_RSA downgrade attacks and facilitate brute-force decryption by offering a weak ...

  • EPSS 7.95%
  • Veröffentlicht 09.01.2015 02:59:09
  • Zuletzt bearbeitet 12.04.2025 10:46:40

OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k does not enforce certain constraints on certificate data, which allows remote attackers to defeat a fingerprint-based certificate-blacklist protection mechanism by including crafted...

  • EPSS 8.35%
  • Veröffentlicht 09.01.2015 02:59:02
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The ssl3_get_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote SSL servers to conduct ECDHE-to-ECDH downgrade attacks and trigger a loss of forward secrecy by omitting the ServerK...

  • EPSS 18.97%
  • Veröffentlicht 09.01.2015 02:59:01
  • Zuletzt bearbeitet 12.04.2025 10:46:40

OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted DTLS message that is processed with a different read operation fo...

  • EPSS 7.89%
  • Veröffentlicht 09.01.2015 02:59:00
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The BN_sqr implementation in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k does not properly calculate the square of a BIGNUM value, which might make it easier for remote attackers to defeat cryptographic protection mechanisms ...

  • EPSS 8.59%
  • Veröffentlicht 24.12.2014 11:59:00
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The ssl23_get_client_hello function in s23_srvr.c in OpenSSL 0.9.8zc, 1.0.0o, and 1.0.1j does not properly handle attempts to use unsupported protocols, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon c...

  • EPSS 30.86%
  • Veröffentlicht 19.10.2014 01:55:13
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Memory leak in d1_srtp.c in the DTLS SRTP extension in OpenSSL 1.0.1 before 1.0.1j allows remote attackers to cause a denial of service (memory consumption) via a crafted handshake message.

  • EPSS 24.09%
  • Veröffentlicht 19.10.2014 01:55:13
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Memory leak in the tls_decrypt_ticket function in t1_lib.c in OpenSSL before 0.9.8zc, 1.0.0 before 1.0.0o, and 1.0.1 before 1.0.1j allows remote attackers to cause a denial of service (memory consumption) via a crafted session ticket that triggers an...

  • EPSS 4.5%
  • Veröffentlicht 19.10.2014 01:55:13
  • Zuletzt bearbeitet 12.04.2025 10:46:40

OpenSSL before 0.9.8zc, 1.0.0 before 1.0.0o, and 1.0.1 before 1.0.1j does not properly enforce the no-ssl3 build option, which allows remote attackers to bypass intended access restrictions via an SSL 3.0 handshake, related to s23_clnt.c and s23_srvr...