OpenSSL

OpenSSL

274 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 10.27%
  • Veröffentlicht 17.08.2010 20:00:03
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Double free vulnerability in the ssl3_get_key_exchange function in the OpenSSL client (ssl/s3_clnt.c) in OpenSSL 1.0.0a, 0.9.8, 0.9.7, and possibly other versions, when using ECDH, allows context-dependent attackers to cause a denial of service (cras...

  • EPSS 23.02%
  • Veröffentlicht 03.06.2010 14:30:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The Cryptographic Message Syntax (CMS) implementation in crypto/cms/cms_asn1.c in OpenSSL before 0.9.8o and 1.x before 1.0.0a does not properly handle structures that contain OriginatorInfo, which allows context-dependent attackers to modify invalid ...

  • EPSS 0.5%
  • Veröffentlicht 03.06.2010 14:30:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

RSA verification recovery in the EVP_PKEY_verify_recover function in OpenSSL 1.x before 1.0.0a, as used by pkeyutl and possibly other applications, returns uninitialized memory upon failure, which might allow context-dependent attackers to bypass int...

  • EPSS 15.47%
  • Veröffentlicht 26.03.2010 18:30:00
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The ssl3_get_record function in ssl/s3_pkt.c in OpenSSL 0.9.8f through 0.9.8m allows remote attackers to cause a denial of service (crash) via a malformed record in a TLS connection that triggers a NULL pointer dereference, related to the minor versi...

  • EPSS 19.97%
  • Veröffentlicht 05.03.2010 19:30:00
  • Zuletzt bearbeitet 11.04.2025 00:51:21

OpenSSL before 0.9.8m does not check for a NULL return value from bn_wexpand function calls in (1) crypto/bn/bn_div.c, (2) crypto/bn/bn_gf2m.c, (3) crypto/ec/ec2_smpl.c, and (4) engines/e_ubsec.c, which has unspecified impact and context-dependent at...

  • EPSS 17.27%
  • Veröffentlicht 05.03.2010 19:30:00
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The kssl_keytab_is_available function in ssl/kssl.c in OpenSSL before 0.9.8n, when Kerberos is enabled but Kerberos configuration files cannot be opened, does not check a certain return value, which allows remote attackers to cause a denial of servic...

  • EPSS 0.09%
  • Veröffentlicht 05.03.2010 19:30:00
  • Zuletzt bearbeitet 11.04.2025 00:51:21

OpenSSL 0.9.8i on the Gaisler Research LEON3 SoC on the Xilinx Virtex-II Pro FPGA uses a Fixed Width Exponentiation (FWE) algorithm for certain signature calculations, and does not verify the signature before providing it to a caller, which makes it ...

  • EPSS 20.24%
  • Veröffentlicht 14.01.2010 19:30:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Memory leak in the zlib_stateful_finish function in crypto/comp/c_zlib.c in OpenSSL 0.9.8l and earlier and 1.0.0 Beta through Beta 4 allows remote attackers to cause a denial of service (memory consumption) via vectors that trigger incorrect calls to...

Exploit
  • EPSS 2.3%
  • Veröffentlicht 09.11.2009 17:30:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

The TLS protocol, and the SSL protocol 3.0 and possibly earlier, as used in Microsoft Internet Information Services (IIS) 7.0, mod_ssl in the Apache HTTP Server 2.2.14 and earlier, OpenSSL before 0.9.8l, GnuTLS 2.8.5 and earlier, Mozilla Network Secu...

  • EPSS 2.24%
  • Veröffentlicht 30.07.2009 19:30:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

The Network Security Services (NSS) library before 3.12.3, as used in Firefox; GnuTLS before 2.6.4 and 2.7.4; OpenSSL 0.9.8 through 0.9.8k; and other products support MD2 with X.509 certificates, which might allow remote attackers to spoof certificat...