OpenSSL

OpenSSL

274 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 8.96%
  • Veröffentlicht 10.07.2008 17:41:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Memory leak in the zlib_stateful_init function in crypto/comp/c_zlib.c in libssl in OpenSSL 0.9.8f through 0.9.8h allows remote attackers to cause a denial of service (memory consumption) via multiple calls, as demonstrated by initial SSL client hand...

  • EPSS 11.28%
  • Veröffentlicht 29.05.2008 16:32:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Double free vulnerability in OpenSSL 0.9.8f and 0.9.8g, when the TLS server name extensions are enabled, allows remote attackers to cause a denial of service (crash) via a malformed Client Hello packet. NOTE: some of these details are obtained from ...

  • EPSS 18.97%
  • Veröffentlicht 29.05.2008 16:32:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

OpenSSL 0.9.8f and 0.9.8g allows remote attackers to cause a denial of service (crash) via a TLS handshake that omits the Server Key Exchange message and uses "particular cipher suites," which triggers a NULL pointer dereference.

Exploit
  • EPSS 5.55%
  • Veröffentlicht 13.05.2008 17:20:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

OpenSSL 0.9.8c-1 up to versions before 0.9.8g-9 on Debian-based operating systems uses a random number generator that generates predictable numbers, which makes it easier for remote attackers to conduct brute force guessing attacks against cryptograp...

  • EPSS 10.35%
  • Veröffentlicht 13.10.2007 01:17:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Off-by-one error in the DTLS implementation in OpenSSL 0.9.8 before 0.9.8f allows remote attackers to execute arbitrary code via unspecified vectors.

  • EPSS 47.52%
  • Veröffentlicht 27.09.2007 20:17:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Off-by-one error in the SSL_get_shared_ciphers function in OpenSSL 0.9.7 up to 0.9.7l, and 0.9.8 up to 0.9.8f, might allow remote attackers to execute arbitrary code via a crafted packet that triggers a one-byte buffer underflow. NOTE: this issue wa...

  • EPSS 0.15%
  • Veröffentlicht 08.08.2007 01:17:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

The BN_from_montgomery function in crypto/bn/bn_mont.c in OpenSSL 0.9.8e and earlier does not properly perform Montgomery multiplication, which might allow local users to conduct a side-channel attack and retrieve RSA private keys.

  • EPSS 8.84%
  • Veröffentlicht 28.09.2006 18:07:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

OpenSSL 0.9.7 before 0.9.7l and 0.9.8 before 0.9.8d allows remote attackers to cause a denial of service (infinite loop and memory consumption) via malformed ASN.1 structures that trigger an improperly handled error condition.

  • EPSS 11.8%
  • Veröffentlicht 28.09.2006 18:07:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions allows attackers to cause a denial of service (CPU consumption) via parasitic public keys with large (1) "public exponent" or (2) "public modulus" values in X.509 certificates tha...

  • EPSS 32.33%
  • Veröffentlicht 28.09.2006 18:07:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Buffer overflow in the SSL_get_shared_ciphers function in OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions has unspecified impact and remote attack vectors involving a long list of ciphers.