OpenSSL

OpenSSL

274 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 7.43%
  • Veröffentlicht 19.04.2012 17:55:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The asn1_d2i_read_bio function in crypto/asn1/a_d2i_fp.c in OpenSSL before 0.9.8v, 1.0.0 before 1.0.0i, and 1.0.1 before 1.0.1a does not properly interpret integer data, which allows remote attackers to conduct buffer overflow attacks, and cause a de...

  • EPSS 3.84%
  • Veröffentlicht 15.03.2012 17:55:00
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The mime_param_cmp function in crypto/asn1/asn_mime.c in OpenSSL before 0.9.8u and 1.x before 1.0.0h allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted S/MIME message, a different vulne...

  • EPSS 2.77%
  • Veröffentlicht 13.03.2012 03:12:26
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The implementation of Cryptographic Message Syntax (CMS) and PKCS #7 in OpenSSL before 0.9.8u and 1.x before 1.0.0h does not properly restrict certain oracle behavior, which makes it easier for context-dependent attackers to decrypt data via a Millio...

  • EPSS 1.41%
  • Veröffentlicht 29.02.2012 11:55:04
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The mime_hdr_cmp function in crypto/asn1/asn_mime.c in OpenSSL 0.9.8t and earlier allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted S/MIME message.

  • EPSS 0.23%
  • Veröffentlicht 27.01.2012 00:55:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

crypto/bn/bn_nist.c in OpenSSL before 0.9.8h on 32-bit platforms, as used in stunnel and other products, in certain circumstances involving ECDH or ECDHE cipher suites, uses an incorrect modular reduction algorithm in its implementation of the P-256 ...

  • EPSS 3.26%
  • Veröffentlicht 19.01.2012 19:55:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

OpenSSL 0.9.8s and 1.0.0f does not properly support DTLS applications, which allows remote attackers to cause a denial of service (crash) via unspecified vectors related to an out-of-bounds read. NOTE: this vulnerability exists because of an incorre...

  • EPSS 3.16%
  • Veröffentlicht 06.01.2012 01:55:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The Server Gated Cryptography (SGC) implementation in OpenSSL before 0.9.8s and 1.x before 1.0.0f does not properly handle handshake restarts, which allows remote attackers to cause a denial of service (CPU consumption) via unspecified vectors.

  • EPSS 0.83%
  • Veröffentlicht 06.01.2012 01:55:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The GOST ENGINE in OpenSSL before 1.0.0f does not properly handle invalid parameters for the GOST block cipher, which allows remote attackers to cause a denial of service (daemon crash) via crafted data from a TLS client.

  • EPSS 1.25%
  • Veröffentlicht 06.01.2012 01:55:00
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The DTLS implementation in OpenSSL before 0.9.8s and 1.x before 1.0.0f performs a MAC check only if certain padding is valid, which makes it easier for remote attackers to recover plaintext via a padding oracle attack.

  • EPSS 7.44%
  • Veröffentlicht 06.01.2012 01:55:00
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Double free vulnerability in OpenSSL 0.9.8 before 0.9.8s, when X509_V_FLAG_POLICY_CHECK is enabled, allows remote attackers to have an unspecified impact by triggering failure of a policy check.