CVE-2018-0735
- EPSS 9.26%
- Veröffentlicht 29.10.2018 13:29:00
- Zuletzt bearbeitet 21.11.2024 03:38:50
The OpenSSL ECDSA signature algorithm has been shown to be vulnerable to a timing side channel attack. An attacker could use variations in the signing algorithm to recover the private key. Fixed in OpenSSL 1.1.0j (Affected 1.1.0-1.1.0i). Fixed in Ope...
CVE-2016-7056
- EPSS 0.33%
- Veröffentlicht 10.09.2018 16:29:00
- Zuletzt bearbeitet 21.11.2024 02:57:22
A timing attack flaw was found in OpenSSL 1.0.1u and before that could allow a malicious user with local access to recover ECDSA P-256 private keys.
CVE-2018-0732
- EPSS 81.09%
- Veröffentlicht 12.06.2018 13:29:00
- Zuletzt bearbeitet 21.11.2024 03:38:49
During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will cause the client to spend an unreasonably long period of time generating a key for this prime result...
CVE-2018-0737
- EPSS 34.17%
- Veröffentlicht 16.04.2018 18:29:00
- Zuletzt bearbeitet 21.11.2024 03:38:50
The OpenSSL RSA Key generation algorithm has been shown to be vulnerable to a cache timing side channel attack. An attacker with sufficient access to mount cache timing attacks during the RSA key generation process could recover the private key. Fixe...
CVE-2018-0733
- EPSS 2.72%
- Veröffentlicht 27.03.2018 21:29:00
- Zuletzt bearbeitet 21.11.2024 03:38:49
Because of an implementation bug the PA-RISC CRYPTO_memcmp function is effectively reduced to only comparing the least significant bit of each byte. This allows an attacker to forge messages that would be considered as authenticated in an amount of t...
CVE-2018-0739
- EPSS 20.11%
- Veröffentlicht 27.03.2018 21:29:00
- Zuletzt bearbeitet 21.11.2024 03:38:50
Constructed ASN.1 types with a recursive definition (such as can be found in PKCS7) could eventually exceed the stack given malicious input with excessive recursion. This could result in a Denial Of Service attack. There are no such structures used w...
CVE-2017-3737
- EPSS 42.93%
- Veröffentlicht 07.12.2017 16:29:00
- Zuletzt bearbeitet 20.04.2025 01:37:25
OpenSSL 1.0.2 (starting from version 1.0.2b) introduced an "error state" mechanism. The intent was that if a fatal error occurred during a handshake then OpenSSL would move into the error state and would immediately fail if you attempted to continue ...
CVE-2017-3738
- EPSS 13.96%
- Veröffentlicht 07.12.2017 16:29:00
- Zuletzt bearbeitet 20.04.2025 01:37:25
There is an overflow bug in the AVX2 Montgomery multiplication procedure used in exponentiation with 1024-bit moduli. No EC algorithms are affected. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult...
CVE-2016-8610
- EPSS 69.1%
- Veröffentlicht 13.11.2017 22:29:00
- Zuletzt bearbeitet 20.04.2025 01:37:25
A denial of service flaw was found in OpenSSL 0.9.8, 1.0.1, 1.0.2 through 1.0.2h, and 1.1.0 in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL ser...
CVE-2017-3736
- EPSS 8.14%
- Veröffentlicht 02.11.2017 17:29:00
- Zuletzt bearbeitet 20.04.2025 01:37:25
There is a carry propagating bug in the x86_64 Montgomery squaring procedure in OpenSSL before 1.0.2m and 1.1.0 before 1.1.0g. No EC algorithms are affected. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very ...