OpenSSL

OpenSSL

274 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 20.63%
  • Veröffentlicht 01.11.2022 18:15:11
  • Zuletzt bearbeitet 04.11.2025 20:16:04

A buffer overrun can be triggered in X.509 certificate verification, specifically in name constraint checking. Note that this occurs after certificate chain signature verification and requires either a CA to have signed a malicious certificate or for...

  • EPSS 83.22%
  • Veröffentlicht 01.11.2022 18:15:10
  • Zuletzt bearbeitet 04.11.2025 20:16:04

A buffer overrun can be triggered in X.509 certificate verification, specifically in name constraint checking. Note that this occurs after certificate chain signature verification and requires either a CA to have signed the malicious certificate or f...

  • EPSS 15.63%
  • Veröffentlicht 11.10.2022 15:15:10
  • Zuletzt bearbeitet 21.11.2024 07:19:21

OpenSSL supports creating a custom cipher via the legacy EVP_CIPHER_meth_new() function and associated function calls. This function was deprecated in OpenSSL 3.0 and application authors are instead encouraged to use the new provider mechanism in ord...

  • EPSS 0.41%
  • Veröffentlicht 05.07.2022 11:15:08
  • Zuletzt bearbeitet 21.11.2024 07:00:18

AES OCB mode for 32-bit x86 platforms using the AES-NI assembly optimised implementation will not encrypt the entirety of the data under some circumstances. This could reveal sixteen bytes of data that was preexisting in the memory that wasn't writte...

Exploit
  • EPSS 55.91%
  • Veröffentlicht 01.07.2022 08:15:07
  • Zuletzt bearbeitet 21.11.2024 07:00:40

The OpenSSL 3.0.4 release introduced a serious bug in the RSA implementation for X86_64 CPUs supporting the AVX512IFMA instructions. This issue makes the RSA implementation with 2048 bit private keys incorrect on such machines and memory corruption w...

  • EPSS 18.58%
  • Veröffentlicht 21.06.2022 15:15:09
  • Zuletzt bearbeitet 03.11.2025 22:15:58

In addition to the c_rehash shell command injection identified in CVE-2022-1292, further circumstances where the c_rehash script does not properly sanitise shell metacharacters to prevent command injection were found by code review. When the CVE-2022...

  • EPSS 41.21%
  • Veröffentlicht 03.05.2022 16:15:18
  • Zuletzt bearbeitet 13.08.2025 14:15:28

The c_rehash script does not properly sanitise shell metacharacters to prevent command injection. This script is distributed by some operating systems in a manner where it is automatically executed. On such operating systems, an attacker could execut...

  • EPSS 0.15%
  • Veröffentlicht 03.05.2022 16:15:18
  • Zuletzt bearbeitet 05.05.2025 17:17:34

The function `OCSP_basic_verify` verifies the signer certificate on an OCSP response. In the case where the (non-default) flag OCSP_NOCHECKS is used then the response will be positive (meaning a successful verification) even in the case where the res...

  • EPSS 0.07%
  • Veröffentlicht 03.05.2022 16:15:18
  • Zuletzt bearbeitet 21.11.2024 06:40:43

The OpenSSL 3.0 implementation of the RC4-MD5 ciphersuite incorrectly uses the AAD data as the MAC key. This makes the MAC key trivially predictable. An attacker could exploit this issue by performing a man-in-the-middle attack to modify data being s...

  • EPSS 0.3%
  • Veröffentlicht 03.05.2022 16:15:18
  • Zuletzt bearbeitet 05.05.2025 17:17:34

The OPENSSL_LH_flush() function, which empties a hash table, contains a bug that breaks reuse of the memory occuppied by the removed hash table entries. This function is used when decoding certificates or keys. If a long lived process periodically de...