OpenSSL

OpenSSL

262 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.5%
  • Published 03.06.2010 14:30:01
  • Last modified 11.04.2025 00:51:21

RSA verification recovery in the EVP_PKEY_verify_recover function in OpenSSL 1.x before 1.0.0a, as used by pkeyutl and possibly other applications, returns uninitialized memory upon failure, which might allow context-dependent attackers to bypass int...

  • EPSS 15.47%
  • Published 26.03.2010 18:30:00
  • Last modified 11.04.2025 00:51:21

The ssl3_get_record function in ssl/s3_pkt.c in OpenSSL 0.9.8f through 0.9.8m allows remote attackers to cause a denial of service (crash) via a malformed record in a TLS connection that triggers a NULL pointer dereference, related to the minor versi...

  • EPSS 17.52%
  • Published 05.03.2010 19:30:00
  • Last modified 11.04.2025 00:51:21

OpenSSL before 0.9.8m does not check for a NULL return value from bn_wexpand function calls in (1) crypto/bn/bn_div.c, (2) crypto/bn/bn_gf2m.c, (3) crypto/ec/ec2_smpl.c, and (4) engines/e_ubsec.c, which has unspecified impact and context-dependent at...

  • EPSS 11.19%
  • Published 05.03.2010 19:30:00
  • Last modified 11.04.2025 00:51:21

The kssl_keytab_is_available function in ssl/kssl.c in OpenSSL before 0.9.8n, when Kerberos is enabled but Kerberos configuration files cannot be opened, does not check a certain return value, which allows remote attackers to cause a denial of servic...

  • EPSS 0.12%
  • Published 05.03.2010 19:30:00
  • Last modified 11.04.2025 00:51:21

OpenSSL 0.9.8i on the Gaisler Research LEON3 SoC on the Xilinx Virtex-II Pro FPGA uses a Fixed Width Exponentiation (FWE) algorithm for certain signature calculations, and does not verify the signature before providing it to a caller, which makes it ...

  • EPSS 14.53%
  • Published 14.01.2010 19:30:00
  • Last modified 09.04.2025 00:30:58

Memory leak in the zlib_stateful_finish function in crypto/comp/c_zlib.c in OpenSSL 0.9.8l and earlier and 1.0.0 Beta through Beta 4 allows remote attackers to cause a denial of service (memory consumption) via vectors that trigger incorrect calls to...

Exploit
  • EPSS 2.84%
  • Published 09.11.2009 17:30:00
  • Last modified 09.04.2025 00:30:58

The TLS protocol, and the SSL protocol 3.0 and possibly earlier, as used in Microsoft Internet Information Services (IIS) 7.0, mod_ssl in the Apache HTTP Server 2.2.14 and earlier, OpenSSL before 0.9.8l, GnuTLS 2.8.5 and earlier, Mozilla Network Secu...

  • EPSS 2.06%
  • Published 30.07.2009 19:30:00
  • Last modified 09.04.2025 00:30:58

The Network Security Services (NSS) library before 3.12.3, as used in Firefox; GnuTLS before 2.6.4 and 2.7.4; OpenSSL 0.9.8 through 0.9.8k; and other products support MD2 with X.509 certificates, which might allow remote attackers to spoof certificat...

Exploit
  • EPSS 42.63%
  • Published 04.06.2009 16:30:00
  • Last modified 09.04.2025 00:30:58

ssl/s3_pkt.c in OpenSSL before 0.9.8i allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a DTLS ChangeCipherSpec packet that occurs before ClientHello.

  • EPSS 14.15%
  • Published 04.06.2009 16:30:00
  • Last modified 09.04.2025 00:30:58

The dtls1_retrieve_buffered_fragment function in ssl/d1_both.c in OpenSSL before 1.0.0 Beta 2 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via an out-of-sequence DTLS handshake message, related to a...