OpenSSL

OpenSSL

275 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 28.16%
  • Veröffentlicht 19.03.2015 22:59:01
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The ASN.1 signature-verification implementation in the rsa_item_verify function in crypto/rsa/rsa_ameth.c in OpenSSL 1.0.2 before 1.0.2a allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via crafted...

  • EPSS 32.56%
  • Veröffentlicht 19.03.2015 22:59:00
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The dtls1_listen function in d1_lib.c in OpenSSL 1.0.2 before 1.0.2a does not properly isolate the state information of independent data streams, which allows remote attackers to cause a denial of service (application crash) via crafted DTLS traffic,...

  • EPSS 34.25%
  • Veröffentlicht 09.01.2015 02:59:12
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Memory leak in the dtls1_buffer_record function in d1_pkt.c in OpenSSL 1.0.0 before 1.0.0p and 1.0.1 before 1.0.1k allows remote attackers to cause a denial of service (memory consumption) by sending many duplicate records for the next epoch, leading...

  • EPSS 14.56%
  • Veröffentlicht 09.01.2015 02:59:11
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The ssl3_get_cert_verify function in s3_srvr.c in OpenSSL 1.0.0 before 1.0.0p and 1.0.1 before 1.0.1k accepts client authentication with a Diffie-Hellman (DH) certificate without requiring a CertificateVerify message, which allows remote attackers to...

  • EPSS 92.43%
  • Veröffentlicht 09.01.2015 02:59:10
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The ssl3_get_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote SSL servers to conduct RSA-to-EXPORT_RSA downgrade attacks and facilitate brute-force decryption by offering a weak ...

  • EPSS 9.6%
  • Veröffentlicht 09.01.2015 02:59:09
  • Zuletzt bearbeitet 12.04.2025 10:46:40

OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k does not enforce certain constraints on certificate data, which allows remote attackers to defeat a fingerprint-based certificate-blacklist protection mechanism by including crafted...

  • EPSS 11.18%
  • Veröffentlicht 09.01.2015 02:59:02
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The ssl3_get_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote SSL servers to conduct ECDHE-to-ECDH downgrade attacks and trigger a loss of forward secrecy by omitting the ServerK...

  • EPSS 31.58%
  • Veröffentlicht 09.01.2015 02:59:01
  • Zuletzt bearbeitet 12.04.2025 10:46:40

OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted DTLS message that is processed with a different read operation fo...

  • EPSS 7.12%
  • Veröffentlicht 09.01.2015 02:59:00
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The BN_sqr implementation in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k does not properly calculate the square of a BIGNUM value, which might make it easier for remote attackers to defeat cryptographic protection mechanisms ...

  • EPSS 7.45%
  • Veröffentlicht 24.12.2014 11:59:00
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The ssl23_get_client_hello function in s23_srvr.c in OpenSSL 0.9.8zc, 1.0.0o, and 1.0.1j does not properly handle attempts to use unsupported protocols, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon c...