CVE-2012-2110
- EPSS 7.43%
- Veröffentlicht 19.04.2012 17:55:01
- Zuletzt bearbeitet 11.04.2025 00:51:21
The asn1_d2i_read_bio function in crypto/asn1/a_d2i_fp.c in OpenSSL before 0.9.8v, 1.0.0 before 1.0.0i, and 1.0.1 before 1.0.1a does not properly interpret integer data, which allows remote attackers to conduct buffer overflow attacks, and cause a de...
- EPSS 3.84%
- Veröffentlicht 15.03.2012 17:55:00
- Zuletzt bearbeitet 11.04.2025 00:51:21
The mime_param_cmp function in crypto/asn1/asn_mime.c in OpenSSL before 0.9.8u and 1.x before 1.0.0h allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted S/MIME message, a different vulne...
- EPSS 2.77%
- Veröffentlicht 13.03.2012 03:12:26
- Zuletzt bearbeitet 11.04.2025 00:51:21
The implementation of Cryptographic Message Syntax (CMS) and PKCS #7 in OpenSSL before 0.9.8u and 1.x before 1.0.0h does not properly restrict certain oracle behavior, which makes it easier for context-dependent attackers to decrypt data via a Millio...
- EPSS 1.41%
- Veröffentlicht 29.02.2012 11:55:04
- Zuletzt bearbeitet 11.04.2025 00:51:21
The mime_hdr_cmp function in crypto/asn1/asn_mime.c in OpenSSL 0.9.8t and earlier allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted S/MIME message.
CVE-2011-4354
- EPSS 0.23%
- Veröffentlicht 27.01.2012 00:55:01
- Zuletzt bearbeitet 11.04.2025 00:51:21
crypto/bn/bn_nist.c in OpenSSL before 0.9.8h on 32-bit platforms, as used in stunnel and other products, in certain circumstances involving ECDH or ECDHE cipher suites, uses an incorrect modular reduction algorithm in its implementation of the P-256 ...
- EPSS 3.26%
- Veröffentlicht 19.01.2012 19:55:01
- Zuletzt bearbeitet 11.04.2025 00:51:21
OpenSSL 0.9.8s and 1.0.0f does not properly support DTLS applications, which allows remote attackers to cause a denial of service (crash) via unspecified vectors related to an out-of-bounds read. NOTE: this vulnerability exists because of an incorre...
- EPSS 3.16%
- Veröffentlicht 06.01.2012 01:55:01
- Zuletzt bearbeitet 11.04.2025 00:51:21
The Server Gated Cryptography (SGC) implementation in OpenSSL before 0.9.8s and 1.x before 1.0.0f does not properly handle handshake restarts, which allows remote attackers to cause a denial of service (CPU consumption) via unspecified vectors.
- EPSS 0.83%
- Veröffentlicht 06.01.2012 01:55:01
- Zuletzt bearbeitet 11.04.2025 00:51:21
The GOST ENGINE in OpenSSL before 1.0.0f does not properly handle invalid parameters for the GOST block cipher, which allows remote attackers to cause a denial of service (daemon crash) via crafted data from a TLS client.
CVE-2011-4108
- EPSS 1.25%
- Veröffentlicht 06.01.2012 01:55:00
- Zuletzt bearbeitet 11.04.2025 00:51:21
The DTLS implementation in OpenSSL before 0.9.8s and 1.x before 1.0.0f performs a MAC check only if certain padding is valid, which makes it easier for remote attackers to recover plaintext via a padding oracle attack.
CVE-2011-4109
- EPSS 7.44%
- Veröffentlicht 06.01.2012 01:55:00
- Zuletzt bearbeitet 11.04.2025 00:51:21
Double free vulnerability in OpenSSL 0.9.8 before 0.9.8s, when X509_V_FLAG_POLICY_CHECK is enabled, allows remote attackers to have an unspecified impact by triggering failure of a policy check.