OpenSSL

OpenSSL

274 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 17.61%
  • Veröffentlicht 19.03.2015 22:59:00
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The dtls1_listen function in d1_lib.c in OpenSSL 1.0.2 before 1.0.2a does not properly isolate the state information of independent data streams, which allows remote attackers to cause a denial of service (application crash) via crafted DTLS traffic,...

  • EPSS 34.25%
  • Veröffentlicht 09.01.2015 02:59:12
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Memory leak in the dtls1_buffer_record function in d1_pkt.c in OpenSSL 1.0.0 before 1.0.0p and 1.0.1 before 1.0.1k allows remote attackers to cause a denial of service (memory consumption) by sending many duplicate records for the next epoch, leading...

  • EPSS 8.28%
  • Veröffentlicht 09.01.2015 02:59:11
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The ssl3_get_cert_verify function in s3_srvr.c in OpenSSL 1.0.0 before 1.0.0p and 1.0.1 before 1.0.1k accepts client authentication with a Diffie-Hellman (DH) certificate without requiring a CertificateVerify message, which allows remote attackers to...

  • EPSS 92.43%
  • Veröffentlicht 09.01.2015 02:59:10
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The ssl3_get_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote SSL servers to conduct RSA-to-EXPORT_RSA downgrade attacks and facilitate brute-force decryption by offering a weak ...

  • EPSS 5.95%
  • Veröffentlicht 09.01.2015 02:59:09
  • Zuletzt bearbeitet 12.04.2025 10:46:40

OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k does not enforce certain constraints on certificate data, which allows remote attackers to defeat a fingerprint-based certificate-blacklist protection mechanism by including crafted...

  • EPSS 6.8%
  • Veröffentlicht 09.01.2015 02:59:02
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The ssl3_get_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote SSL servers to conduct ECDHE-to-ECDH downgrade attacks and trigger a loss of forward secrecy by omitting the ServerK...

  • EPSS 17.35%
  • Veröffentlicht 09.01.2015 02:59:01
  • Zuletzt bearbeitet 12.04.2025 10:46:40

OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted DTLS message that is processed with a different read operation fo...

  • EPSS 6.84%
  • Veröffentlicht 09.01.2015 02:59:00
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The BN_sqr implementation in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k does not properly calculate the square of a BIGNUM value, which might make it easier for remote attackers to defeat cryptographic protection mechanisms ...

  • EPSS 11.39%
  • Veröffentlicht 24.12.2014 11:59:00
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The ssl23_get_client_hello function in s23_srvr.c in OpenSSL 0.9.8zc, 1.0.0o, and 1.0.1j does not properly handle attempts to use unsupported protocols, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon c...

  • EPSS 26.74%
  • Veröffentlicht 19.10.2014 01:55:13
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Memory leak in d1_srtp.c in the DTLS SRTP extension in OpenSSL 1.0.1 before 1.0.1j allows remote attackers to cause a denial of service (memory consumption) via a crafted handshake message.