OpenSSL

OpenSSL

274 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 20.24%
  • Veröffentlicht 19.10.2014 01:55:13
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Memory leak in the tls_decrypt_ticket function in t1_lib.c in OpenSSL before 0.9.8zc, 1.0.0 before 1.0.0o, and 1.0.1 before 1.0.1j allows remote attackers to cause a denial of service (memory consumption) via a crafted session ticket that triggers an...

  • EPSS 3.24%
  • Veröffentlicht 19.10.2014 01:55:13
  • Zuletzt bearbeitet 12.04.2025 10:46:40

OpenSSL before 0.9.8zc, 1.0.0 before 1.0.0o, and 1.0.1 before 1.0.1j does not properly enforce the no-ssl3 build option, which allows remote attackers to bypass intended access restrictions via an SSL 3.0 handshake, related to s23_clnt.c and s23_srvr...

  • EPSS 93.73%
  • Veröffentlicht 15.10.2014 00:55:02
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The SSL protocol 3.0, as used in OpenSSL through 1.0.1i and other products, uses nondeterministic CBC padding, which makes it easier for man-in-the-middle attackers to obtain cleartext data via a padding-oracle attack, aka the "POODLE" issue.

  • EPSS 47.19%
  • Veröffentlicht 13.08.2014 23:55:07
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Double free vulnerability in d1_both.c in the DTLS implementation in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i allows remote attackers to cause a denial of service (application crash) via crafted DTLS packets that tri...

  • EPSS 52.04%
  • Veröffentlicht 13.08.2014 23:55:07
  • Zuletzt bearbeitet 12.04.2025 10:46:40

d1_both.c in the DTLS implementation in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i allows remote attackers to cause a denial of service (memory consumption) via crafted DTLS handshake messages that trigger memory alloc...

  • EPSS 66.03%
  • Veröffentlicht 13.08.2014 23:55:07
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Memory leak in d1_both.c in the DTLS implementation in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i allows remote attackers to cause a denial of service (memory consumption) via zero-length DTLS fragments that trigger im...

  • EPSS 2.7%
  • Veröffentlicht 13.08.2014 23:55:07
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The OBJ_obj2txt function in crypto/objects/obj_dat.c in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i, when pretty printing is used, does not ensure the presence of '\0' characters, which allows context-dependent attacker...

  • EPSS 11.58%
  • Veröffentlicht 13.08.2014 23:55:07
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Race condition in the ssl_parse_serverhello_tlsext function in t1_lib.c in OpenSSL 1.0.0 before 1.0.0n and 1.0.1 before 1.0.1i, when multithreading and session resumption are used, allows remote SSL servers to cause a denial of service (memory overwr...

  • EPSS 13.68%
  • Veröffentlicht 13.08.2014 23:55:07
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The ssl3_send_client_key_exchange function in s3_clnt.c in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i allows remote DTLS servers to cause a denial of service (NULL pointer dereference and client application crash) via ...

  • EPSS 5.42%
  • Veröffentlicht 13.08.2014 23:55:07
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The ssl23_get_client_hello function in s23_srvr.c in OpenSSL 1.0.1 before 1.0.1i allows man-in-the-middle attackers to force the use of TLS 1.0 by triggering ClientHello message fragmentation in communication between a client and server that both sup...