OpenSSL

OpenSSL

274 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.36%
  • Veröffentlicht 08.12.2020 16:15:11
  • Zuletzt bearbeitet 21.11.2024 05:11:45

The X.509 GeneralName type is a generic type for representing different types of names. One of those name types is known as EDIPartyName. OpenSSL provides a function GENERAL_NAME_cmp which compares different instances of a GENERAL_NAME to see if they...

  • EPSS 0.84%
  • Veröffentlicht 09.09.2020 14:15:12
  • Zuletzt bearbeitet 21.11.2024 05:11:45

The Raccoon attack exploits a flaw in the TLS specification which can lead to an attacker being able to compute the pre-master secret in connections which have used a Diffie-Hellman (DH) based ciphersuite. In such a case this would result in the atta...

Exploit
  • EPSS 67.31%
  • Veröffentlicht 21.04.2020 14:15:11
  • Zuletzt bearbeitet 21.11.2024 05:11:45

Server or client applications that call the SSL_check_chain() function during or after a TLS 1.3 handshake may crash due to a NULL pointer dereference as a result of incorrect handling of the "signature_algorithms_cert" TLS extension. The crash occur...

  • EPSS 3.87%
  • Veröffentlicht 06.12.2019 18:15:12
  • Zuletzt bearbeitet 21.11.2024 04:36:48

There is an overflow bug in the x64_64 Montgomery squaring procedure used in exponentiation with 512-bit moduli. No EC algorithms are affected. Analysis suggests that attacks against 2-prime RSA1024, 3-prime RSA1536, and DSA1024 as a result of this d...

  • EPSS 0.26%
  • Veröffentlicht 10.09.2019 17:15:11
  • Zuletzt bearbeitet 21.11.2024 04:36:48

Normally in OpenSSL EC groups always have a co-factor present and this is used in side channel resistant code paths. However, in some cases, it is possible to construct a group using explicit parameters (instead of using a named curve). In those case...

  • EPSS 2.19%
  • Veröffentlicht 10.09.2019 17:15:11
  • Zuletzt bearbeitet 21.11.2024 04:36:48

OpenSSL 1.1.1 introduced a rewritten random number generator (RNG). This was intended to include protection in the event of a fork() system call in order to ensure that the parent and child processes did not share the same RNG state. However this pro...

  • EPSS 1.63%
  • Veröffentlicht 10.09.2019 17:15:11
  • Zuletzt bearbeitet 21.11.2024 04:36:49

In situations where an attacker receives automated notification of the success or failure of a decryption attempt an attacker, after sending a very large number of messages to be decrypted, can recover a CMS/PKCS7 transported encryption key or decryp...

  • EPSS 0.16%
  • Veröffentlicht 30.07.2019 17:15:12
  • Zuletzt bearbeitet 21.11.2024 04:36:48

OpenSSL has internal defaults for a directory tree where it can find a configuration file as well as certificates used for verification in TLS. This directory is most commonly referred to as OPENSSLDIR, and is configurable with the --prefix / --opens...

  • EPSS 3.57%
  • Veröffentlicht 06.03.2019 21:29:00
  • Zuletzt bearbeitet 21.11.2024 04:36:47

ChaCha20-Poly1305 is an AEAD cipher, and requires a unique nonce input for every encryption operation. RFC 7539 specifies that the nonce value (IV) should be 96 bits (12 bytes). OpenSSL allows a variable nonce length and front pads the nonce with 0 b...

  • EPSS 4.96%
  • Veröffentlicht 27.02.2019 23:29:00
  • Zuletzt bearbeitet 21.11.2024 04:36:48

If an application encounters a fatal protocol error and then calls SSL_shutdown() twice (once to send a close_notify, and once to receive one) then OpenSSL can respond differently to the calling application if a 0 byte record is received with invalid...