| Name |
Description |
| CVE-2018-0739 |
Constructed ASN.1 types with a recursive definition (such as can be
found in PKCS7) could eventually exceed the stack given malicious
input with excessive recursion. This could result in a Denial Of
Service attack. There are no such structures used within SSL/TLS that
come from untrusted sources so this is considered safe. Fixed in
OpenSSL 1.1.0h (Affected 1.1.0-1.1.0g). Fixed in OpenSSL 1.0.2o
(Affected 1.0.2b-1.0.2n).
|
| CVE-2018-0737 |
The OpenSSL RSA Key generation algorithm has been shown to be
vulnerable to a cache timing side channel attack. An attacker with
sufficient access to mount cache timing attacks during the RSA key
generation process could recover the private key. Fixed in OpenSSL
1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev
(Affected 1.0.2b-1.0.2o).
|
| CVE-2018-0733 |
Because of an implementation bug the PA-RISC CRYPTO_memcmp function is
effectively reduced to only comparing the least significant bit of
each byte. This allows an attacker to forge messages that would be
considered as authenticated in an amount of tries lower than that
guaranteed by the security claims of the scheme. The module can only
be compiled by the HP-UX assembler, so that only HP-UX PA-RISC targets
are affected. Fixed in OpenSSL 1.1.0h (Affected 1.1.0-1.1.0g).
|
| CVE-2018-0732 |
During key agreement in a TLS handshake using a DH(E) based
ciphersuite a malicious server can send a very large prime value to
the client. This will cause the client to spend an unreasonably long
period of time generating a key for this prime resulting in a hang
until the client has finished. This could be exploited in a Denial Of
Service attack. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h).
Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2-1.0.2o).
|
| CVE-2017-8821 |
In Tor before 0.2.5.16, 0.2.6 through 0.2.8 before 0.2.8.17, 0.2.9
before 0.2.9.14, 0.3.0 before 0.3.0.13, and 0.3.1 before 0.3.1.9, an
attacker can cause a denial of service (application hang) via crafted
PEM input that signifies a public key requiring a password, which
triggers an attempt by the OpenSSL library to ask the user for the
password, aka TROVE-2017-011.
|
| CVE-2017-5681 |
The RSA-CRT implementation in the Intel QuickAssist Technology (QAT)
Engine for OpenSSL versions prior to 0.5.19 may allow remote attackers
to obtain private RSA keys by conducting a Lenstra side-channel
attack.
|
| CVE-2017-3738 |
There is an overflow bug in the AVX2 Montgomery multiplication
procedure used in exponentiation with 1024-bit moduli. No EC
algorithms are affected. Analysis suggests that attacks against RSA
and DSA as a result of this defect would be very difficult to perform
and are not believed likely. Attacks against DH1024 are considered
just feasible, because most of the work necessary to deduce
information about a private key may be performed offline. The amount
of resources required for such an attack would be significant.
However, for an attack on TLS to be meaningful, the server would have
to share the DH1024 private key among multiple clients, which is no
longer an option since CVE-2016-0701. This only affects processors
that support the AVX2 but not ADX extensions like Intel Haswell (4th
generation). Note: The impact from this issue is similar to
CVE-2017-3736, CVE-2017-3732 and CVE-2015-3193. OpenSSL version
1.0.2-1.0.2m and 1.1.0-1.1.0g are affected. Fixed in OpenSSL 1.0.2n.
Due to the low severity of this issue we are not issuing a new release
of OpenSSL 1.1.0 at this time. The fix will be included in OpenSSL
1.1.0h when it becomes available. The fix is also available in commit
e502cc86d in the OpenSSL git repository.
|
| CVE-2017-3737 |
OpenSSL 1.0.2 (starting from version 1.0.2b) introduced an "error
state" mechanism. The intent was that if a fatal error occurred during
a handshake then OpenSSL would move into the error state and would
immediately fail if you attempted to continue the handshake. This
works as designed for the explicit handshake functions
(SSL_do_handshake(), SSL_accept() and SSL_connect()), however due to a
bug it does not work correctly if SSL_read() or SSL_write() is called
directly. In that scenario, if the handshake fails then a fatal error
will be returned in the initial function call. If
SSL_read()/SSL_write() is subsequently called by the application for
the same SSL object then it will succeed and the data is passed
without being decrypted/encrypted directly from the SSL/TLS record
layer. In order to exploit this issue an application bug would have to
be present that resulted in a call to SSL_read()/SSL_write() being
issued after having already received a fatal error. OpenSSL version
1.0.2b-1.0.2m are affected. Fixed in OpenSSL 1.0.2n. OpenSSL 1.1.0 is
not affected.
|
| CVE-2017-3736 |
There is a carry propagating bug in the x86_64 Montgomery squaring
procedure in OpenSSL before 1.0.2m and 1.1.0 before 1.1.0g. No EC
algorithms are affected. Analysis suggests that attacks against RSA
and DSA as a result of this defect would be very difficult to perform
and are not believed likely. Attacks against DH are considered just
feasible (although very difficult) because most of the work necessary
to deduce information about a private key may be performed offline.
The amount of resources required for such an attack would be very
significant and likely only accessible to a limited number of
attackers. An attacker would additionally need online access to an
unpatched system using the target private key in a scenario with
persistent DH parameters and a private key that is shared between
multiple clients. This only affects processors that support the BMI1,
BMI2 and ADX extensions like Intel Broadwell (5th generation) and
later or AMD Ryzen.
|
| CVE-2017-3735 |
While parsing an IPAddressFamily extension in an X.509 certificate, it
is possible to do a one-byte overread. This would result in an
incorrect text display of the certificate. This bug has been present
since 2006 and is present in all versions of OpenSSL before 1.0.2m and
1.1.0g.
|
| CVE-2017-3733 |
During a renegotiation handshake if the Encrypt-Then-Mac extension is
negotiated where it was not in the original handshake (or vice-versa)
then this can cause OpenSSL 1.1.0 before 1.1.0e to crash (dependent on
ciphersuite). Both clients and servers are affected.
|
| CVE-2017-3732 |
There is a carry propagating bug in the x86_64 Montgomery squaring
procedure in OpenSSL 1.0.2 before 1.0.2k and 1.1.0 before 1.1.0d. No
EC algorithms are affected. Analysis suggests that attacks against RSA
and DSA as a result of this defect would be very difficult to perform
and are not believed likely. Attacks against DH are considered just
feasible (although very difficult) because most of the work necessary
to deduce information about a private key may be performed offline.
The amount of resources required for such an attack would be very
significant and likely only accessible to a limited number of
attackers. An attacker would additionally need online access to an
unpatched system using the target private key in a scenario with
persistent DH parameters and a private key that is shared between
multiple clients. For example this can occur by default in OpenSSL DHE
based SSL/TLS ciphersuites. Note: This issue is very similar to
CVE-2015-3193 but must be treated as a separate problem.
|
| CVE-2017-3731 |
If an SSL/TLS server or client is running on a 32-bit host, and a
specific cipher is being used, then a truncated packet can cause that
server or client to perform an out-of-bounds read, usually resulting
in a crash. For OpenSSL 1.1.0, the crash can be triggered when using
CHACHA20/POLY1305; users should upgrade to 1.1.0d. For Openssl 1.0.2,
the crash can be triggered when using RC4-MD5; users who have not
disabled that algorithm should update to 1.0.2k.
|
| CVE-2017-3730 |
In OpenSSL 1.1.0 before 1.1.0d, if a malicious server supplies bad
parameters for a DHE or ECDHE key exchange then this can result in the
client attempting to dereference a NULL pointer leading to a client
crash. This could be exploited in a Denial of Service attack.
|
| CVE-2017-15896 |
Node.js was affected by OpenSSL vulnerability CVE-2017-3737 in regards
to the use of SSL_read() due to TLS handshake failure. The result was
that an active network attacker could send application data to Node.js
using the TLS or HTTP2 modules in a way that bypassed TLS
authentication and encryption.
|
| CVE-2017-11144 |
In PHP before 5.6.31, 7.x before 7.0.21, and 7.1.x before 7.1.7, the
openssl extension PEM sealing code did not check the return value of
the OpenSSL sealing function, which could lead to a crash of the PHP
interpreter, related to an interpretation conflict for a negative
number in ext/openssl/openssl.c, and an OpenSSL documentation omission.
|
| CVE-2016-9015 |
Versions 1.17 and 1.18 of the Python urllib3 library suffer from a
vulnerability that can cause them, in certain configurations, to not
correctly validate TLS certificates. This places users of the library
with those configurations at risk of man-in-the-middle and information
leakage attacks. This vulnerability affects users using versions 1.17
and 1.18 of the urllib3 library, who are using the optional PyOpenSSL
support for TLS instead of the regular standard library TLS backend,
and who are using OpenSSL 1.1.0 via PyOpenSSL. This is an extremely
uncommon configuration, so the security impact of this vulnerability
is low.
|
| CVE-2016-8610 |
A denial of service flaw was found in OpenSSL 0.9.8, 1.0.1, 1.0.2
through 1.0.2h, and 1.1.0 in the way the TLS/SSL protocol defined
processing of ALERT packets during a connection handshake. A remote
attacker could use this flaw to make a TLS/SSL server consume an
excessive amount of CPU and fail to accept connections from other
clients.
|
| CVE-2016-7798 |
The openssl gem for Ruby uses the same initialization vector (IV) in
GCM Mode (aes-*-gcm) when the IV is set before the key, which makes it
easier for context-dependent attackers to bypass the encryption
protection mechanism.
|
| CVE-2016-7056 |
A timing attack flaw was found in OpenSSL 1.0.1u and before that could
allow a malicious user with local access to recover ECDSA P-256
private keys.
|
| CVE-2016-7055 |
There is a carry propagating bug in the Broadwell-specific Montgomery
multiplication procedure in OpenSSL 1.0.2 and 1.1.0 before 1.1.0c that
handles input lengths divisible by, but longer than 256 bits. Analysis
suggests that attacks against RSA, DSA and DH private keys are
impossible. This is because the subroutine in question is not used in
operations with the private key itself and an input of the attacker's
direct choice. Otherwise the bug can manifest itself as transient
authentication and key negotiation failures or reproducible erroneous
outcome of public-key operations with specially crafted input. Among
EC algorithms only Brainpool P-512 curves are affected and one
presumably can attack ECDH key negotiation. Impact was not analyzed in
detail, because pre-requisites for attack are considered unlikely.
Namely multiple clients have to choose the curve in question and the
server has to share the private key among them, neither of which is
default behaviour. Even then only clients that chose the curve will be
affected.
|
| CVE-2016-7054 |
In OpenSSL 1.1.0 before 1.1.0c, TLS connections using
*-CHACHA20-POLY1305 ciphersuites are susceptible to a DoS attack by
corrupting larger payloads. This can result in an OpenSSL crash. This
issue is not considered to be exploitable beyond a DoS.
|
| CVE-2016-7053 |
In OpenSSL 1.1.0 before 1.1.0c, applications parsing invalid CMS
structures can crash with a NULL pointer dereference. This is caused
by a bug in the handling of the ASN.1 CHOICE type in OpenSSL 1.1.0
which can result in a NULL value being passed to the structure
callback if an attempt is made to free certain invalid encodings. Only
CHOICE structures using a callback which do not handle NULL value are
affected.
|
| CVE-2016-7052 |
crypto/x509/x509_vfy.c in OpenSSL 1.0.2i allows remote attackers to
cause a denial of service (NULL pointer dereference and application
crash) by triggering a CRL operation.
|
| CVE-2016-6309 |
statem/statem.c in OpenSSL 1.1.0a does not consider memory-block
movement after a realloc call, which allows remote attackers to cause
a denial of service (use-after-free) or possibly execute arbitrary
code via a crafted TLS session.
|
| CVE-2016-6308 |
statem/statem_dtls.c in the DTLS implementation in OpenSSL 1.1.0
before 1.1.0a allocates memory before checking for an excessive
length, which might allow remote attackers to cause a denial of
service (memory consumption) via crafted DTLS messages.
|
| CVE-2016-6307 |
The state-machine implementation in OpenSSL 1.1.0 before 1.1.0a
allocates memory before checking for an excessive length, which might
allow remote attackers to cause a denial of service (memory
consumption) via crafted TLS messages, related to statem/statem.c and
statem/statem_lib.c.
|
| CVE-2016-6306 |
The certificate parser in OpenSSL before 1.0.1u and 1.0.2 before
1.0.2i might allow remote attackers to cause a denial of service
(out-of-bounds read) via crafted certificate operations, related to
s3_clnt.c and s3_srvr.c.
|
| CVE-2016-6305 |
The ssl3_read_bytes function in record/rec_layer_s3.c in OpenSSL 1.1.0
before 1.1.0a allows remote attackers to cause a denial of service
(infinite loop) by triggering a zero-length record in an SSL_peek
call.
|
| CVE-2016-6304 |
Multiple memory leaks in t1_lib.c in OpenSSL before 1.0.1u, 1.0.2
before 1.0.2i, and 1.1.0 before 1.1.0a allow remote attackers to cause
a denial of service (memory consumption) via large OCSP Status Request
extensions.
|
| CVE-2016-6303 |
Integer overflow in the MDC2_Update function in crypto/mdc2/mdc2dgst.c
in OpenSSL before 1.1.0 allows remote attackers to cause a denial of
service (out-of-bounds write and application crash) or possibly have
unspecified other impact via unknown vectors.
|
| CVE-2016-6302 |
The tls_decrypt_ticket function in ssl/t1_lib.c in OpenSSL before
1.1.0 does not consider the HMAC size during validation of the ticket
length, which allows remote attackers to cause a denial of service via
a ticket that is too short.
|
| CVE-2016-5669 |
Crestron Electronics DM-TXRX-100-STR devices with firmware before
1.3039.00040 use a hardcoded 0xb9eed4d955a59eb3 X.509 certificate from
an OpenSSL Test Certification Authority, which makes it easier for
remote attackers to conduct man-in-the-middle attacks against HTTPS
sessions by leveraging the certificate's trust relationship.
|
| CVE-2016-3613 |
Unspecified vulnerability in the Oracle Secure Global Desktop
component in Oracle Virtualization 4.63, 4.71, and 5.2 allows remote
attackers to affect confidentiality, integrity, and availability via
vectors related to OpenSSL.
|
| CVE-2016-2842 |
The doapr_outch function in crypto/bio/b_print.c in OpenSSL 1.0.1
before 1.0.1s and 1.0.2 before 1.0.2g does not verify that a certain
memory allocation succeeds, which allows remote attackers to cause a
denial of service (out-of-bounds write or memory consumption) or
possibly have unspecified other impact via a long string, as
demonstrated by a large amount of ASN.1 data, a different
vulnerability than CVE-2016-0799.
|
| CVE-2016-2217 |
The OpenSSL address implementation in Socat 1.7.3.0 and 2.0.0-b8 does
not use a prime number for the DH, which makes it easier for remote
attackers to obtain the shared secret.
|
| CVE-2016-2182 |
The BN_bn2dec function in crypto/bn/bn_print.c in OpenSSL before 1.1.0
does not properly validate division results, which allows remote
attackers to cause a denial of service (out-of-bounds write and
application crash) or possibly have unspecified other impact via
unknown vectors.
|
| CVE-2016-2181 |
The Anti-Replay feature in the DTLS implementation in OpenSSL before
1.1.0 mishandles early use of a new epoch number in conjunction with a
large sequence number, which allows remote attackers to cause a denial
of service (false-positive packet drops) via spoofed DTLS records,
related to rec_layer_d1.c and ssl3_record.c.
|
| CVE-2016-2180 |
The TS_OBJ_print_bio function in crypto/ts/ts_lib.c in the X.509
Public Key Infrastructure Time-Stamp Protocol (TSP) implementation in
OpenSSL through 1.0.2h allows remote attackers to cause a denial of
service (out-of-bounds read and application crash) via a crafted
time-stamp file that is mishandled by the "openssl ts" command.
|
| CVE-2016-2179 |
The DTLS implementation in OpenSSL before 1.1.0 does not properly
restrict the lifetime of queue entries associated with unused
out-of-order messages, which allows remote attackers to cause a denial
of service (memory consumption) by maintaining many crafted DTLS
sessions simultaneously, related to d1_lib.c, statem_dtls.c,
statem_lib.c, and statem_srvr.c.
|
| CVE-2016-2178 |
The dsa_sign_setup function in crypto/dsa/dsa_ossl.c in OpenSSL
through 1.0.2h does not properly ensure the use of constant-time
operations, which makes it easier for local users to discover a DSA
private key via a timing side-channel attack.
|
| CVE-2016-2177 |
OpenSSL through 1.0.2h incorrectly uses pointer arithmetic for
heap-buffer boundary checks, which might allow remote attackers to
cause a denial of service (integer overflow and application crash) or
possibly have unspecified other impact by leveraging unexpected malloc
behavior, related to s3_srvr.c, ssl_sess.c, and t1_lib.c.
|
| CVE-2016-2176 |
The X509_NAME_oneline function in crypto/x509/x509_obj.c in OpenSSL
before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to
obtain sensitive information from process stack memory or cause a
denial of service (buffer over-read) via crafted EBCDIC ASN.1 data.
|
| CVE-2016-2109 |
The asn1_d2i_read_bio function in crypto/asn1/a_d2i_fp.c in the ASN.1
BIO implementation in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h
allows remote attackers to cause a denial of service (memory
consumption) via a short invalid encoding.
|
| CVE-2016-2108 |
The ASN.1 implementation in OpenSSL before 1.0.1o and 1.0.2 before
1.0.2c allows remote attackers to execute arbitrary code or cause a
denial of service (buffer underflow and memory corruption) via an ANY
field in crafted serialized data, aka the "negative zero" issue.
|
| CVE-2016-2107 |
The AES-NI implementation in OpenSSL before 1.0.1t and 1.0.2 before
1.0.2h does not consider memory allocation during a certain padding
check, which allows remote attackers to obtain sensitive cleartext
information via a padding-oracle attack against an AES CBC session.
NOTE: this vulnerability exists because of an incorrect fix for
CVE-2013-0169.
|
| CVE-2016-2106 |
Integer overflow in the EVP_EncryptUpdate function in
crypto/evp/evp_enc.c in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h
allows remote attackers to cause a denial of service (heap memory
corruption) via a large amount of data.
|
| CVE-2016-2105 |
Integer overflow in the EVP_EncodeUpdate function in
crypto/evp/encode.c in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h
allows remote attackers to cause a denial of service (heap memory
corruption) via a large amount of binary data.
|
| CVE-2016-0800 |
The SSLv2 protocol, as used in OpenSSL before 1.0.1s and 1.0.2 before
1.0.2g and other products, requires a server to send a ServerVerify
message before establishing that a client possesses certain plaintext
RSA data, which makes it easier for remote attackers to decrypt TLS
ciphertext data by leveraging a Bleichenbacher RSA padding oracle, aka
a "DROWN" attack.
|
| CVE-2016-0799 |
The fmtstr function in crypto/bio/b_print.c in OpenSSL 1.0.1 before
1.0.1s and 1.0.2 before 1.0.2g improperly calculates string lengths,
which allows remote attackers to cause a denial of service (overflow
and out-of-bounds read) or possibly have unspecified other impact via
a long string, as demonstrated by a large amount of ASN.1 data, a
different vulnerability than CVE-2016-2842.
|
| CVE-2016-0798 |
Memory leak in the SRP_VBASE_get_by_user implementation in OpenSSL
1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g allows remote attackers to
cause a denial of service (memory consumption) by providing an invalid
username in a connection attempt, related to apps/s_server.c and
crypto/srp/srp_vfy.c.
|
| CVE-2016-0797 |
Multiple integer overflows in OpenSSL 1.0.1 before 1.0.1s and 1.0.2
before 1.0.2g allow remote attackers to cause a denial of service
(heap memory corruption or NULL pointer dereference) or possibly have
unspecified other impact via a long digit string that is mishandled by
the (1) BN_dec2bn or (2) BN_hex2bn function, related to crypto/bn/bn.h
and crypto/bn/bn_print.c.
|
| CVE-2016-0705 |
Double free vulnerability in the dsa_priv_decode function in
crypto/dsa/dsa_ameth.c in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before
1.0.2g allows remote attackers to cause a denial of service (memory
corruption) or possibly have unspecified other impact via a malformed
DSA private key.
|
| CVE-2016-0704 |
An oracle protection mechanism in the get_client_master_key function
in s2_srvr.c in the SSLv2 implementation in OpenSSL before 0.9.8zf,
1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a
overwrites incorrect MASTER-KEY bytes during use of export cipher
suites, which makes it easier for remote attackers to decrypt TLS
ciphertext data by leveraging a Bleichenbacher RSA padding oracle, a
related issue to CVE-2016-0800.
|
| CVE-2016-0703 |
The get_client_master_key function in s2_srvr.c in the SSLv2
implementation in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1
before 1.0.1m, and 1.0.2 before 1.0.2a accepts a nonzero
CLIENT-MASTER-KEY CLEAR-KEY-LENGTH value for an arbitrary cipher,
which allows man-in-the-middle attackers to determine the MASTER-KEY
value and decrypt TLS ciphertext data by leveraging a Bleichenbacher
RSA padding oracle, a related issue to CVE-2016-0800.
|
| CVE-2016-0702 |
The MOD_EXP_CTIME_COPY_FROM_PREBUF function in crypto/bn/bn_exp.c in
OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g does not properly
consider cache-bank access times during modular exponentiation, which
makes it easier for local users to discover RSA keys by running a
crafted application on the same Intel Sandy Bridge CPU core as a
victim and leveraging cache-bank conflicts, aka a "CacheBleed" attack.
|
| CVE-2016-0701 |
The DH_check_pub_key function in crypto/dh/dh_check.c in OpenSSL 1.0.2
before 1.0.2f does not ensure that prime numbers are appropriate for
Diffie-Hellman (DH) key exchange, which makes it easier for remote
attackers to discover a private DH exponent by making multiple
handshakes with a peer that chose an inappropriate number, as
demonstrated by a number in an X9.42 file.
|
| CVE-2015-8867 |
The openssl_random_pseudo_bytes function in ext/openssl/openssl.c in
PHP before 5.4.44, 5.5.x before 5.5.28, and 5.6.x before 5.6.12
incorrectly relies on the deprecated RAND_pseudo_bytes function, which
makes it easier for remote attackers to defeat cryptographic
protection mechanisms via unspecified vectors.
|
| CVE-2015-3216 |
Race condition in a certain Red Hat patch to the PRNG lock
implementation in the ssleay_rand_bytes function in OpenSSL, as
distributed in openssl-1.0.1e-25.el7 in Red Hat Enterprise Linux
(RHEL) 7 and other products, allows remote attackers to cause a denial
of service (application crash) by establishing many TLS sessions to a
multithreaded server, leading to use of a negative value for a certain
length field.
|
| CVE-2015-3197 |
ssl/s2_srvr.c in OpenSSL 1.0.1 before 1.0.1r and 1.0.2 before 1.0.2f
does not prevent use of disabled ciphers, which makes it easier for
man-in-the-middle attackers to defeat cryptographic protection
mechanisms by performing computations on SSLv2 traffic, related to the
get_client_master_key and get_client_hello functions.
|
| CVE-2015-3196 |
ssl/s3_clnt.c in OpenSSL 1.0.0 before 1.0.0t, 1.0.1 before 1.0.1p, and
1.0.2 before 1.0.2d, when used for a multi-threaded client, writes the
PSK identity hint to an incorrect data structure, which allows remote
servers to cause a denial of service (race condition and double free)
via a crafted ServerKeyExchange message.
|
| CVE-2015-3195 |
The ASN1_TFLG_COMBINE implementation in crypto/asn1/tasn_dec.c in
OpenSSL before 0.9.8zh, 1.0.0 before 1.0.0t, 1.0.1 before 1.0.1q, and
1.0.2 before 1.0.2e mishandles errors caused by malformed
X509_ATTRIBUTE data, which allows remote attackers to obtain sensitive
information from process memory by triggering a decoding failure in a
PKCS#7 or CMS application.
|
| CVE-2015-3194 |
crypto/rsa/rsa_ameth.c in OpenSSL 1.0.1 before 1.0.1q and 1.0.2 before
1.0.2e allows remote attackers to cause a denial of service (NULL
pointer dereference and application crash) via an RSA PSS ASN.1
signature that lacks a mask generation function parameter.
|
| CVE-2015-3193 |
The Montgomery squaring implementation in
crypto/bn/asm/x86_64-mont5.pl in OpenSSL 1.0.2 before 1.0.2e on the
x86_64 platform, as used by the BN_mod_exp function, mishandles carry
propagation and produces incorrect output, which makes it easier for
remote attackers to obtain sensitive private-key information via an
attack against use of a (1) Diffie-Hellman (DH) or (2) Diffie-Hellman
Ephemeral (DHE) ciphersuite.
|
| CVE-2015-2264 |
Multiple untrusted search path vulnerabilities in (1)
EQATEC.Analytics.Monitor.Win32_vc100.dll and (2)
EQATEC.Analytics.Monitor.Win32_vc100-x64.dll in Telerik Analytics
Monitor Library before 3.2.125 allow local users to gain privileges
via a Trojan horse (a) csunsapi.dll, (b) swift.dll, (c) nfhwcrhk.dll,
or (d) surewarehook.dll file in an unspecified directory.
|
| CVE-2015-1794 |
The ssl3_get_key_exchange function in ssl/s3_clnt.c in OpenSSL 1.0.2
before 1.0.2e allows remote servers to cause a denial of service
(segmentation fault) via a zero p value in an anonymous Diffie-Hellman
(DH) ServerKeyExchange message.
|
| CVE-2015-1793 |
The X509_verify_cert function in crypto/x509/x509_vfy.c in OpenSSL
1.0.1n, 1.0.1o, 1.0.2b, and 1.0.2c does not properly process X.509
Basic Constraints cA values during identification of alternative
certificate chains, which allows remote attackers to spoof a
Certification Authority role and trigger unintended certificate
verifications via a valid leaf certificate.
|
| CVE-2015-1792 |
The do_free_upto function in crypto/cms/cms_smime.c in OpenSSL before
0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before
1.0.2b allows remote attackers to cause a denial of service (infinite
loop) via vectors that trigger a NULL value of a BIO data structure,
as demonstrated by an unrecognized X.660 OID for a hash function.
|
| CVE-2015-1791 |
Race condition in the ssl3_get_new_session_ticket function in
ssl/s3_clnt.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1
before 1.0.1n, and 1.0.2 before 1.0.2b, when used for a multi-threaded
client, allows remote attackers to cause a denial of service (double
free and application crash) or possibly have unspecified other impact
by providing a NewSessionTicket during an attempt to reuse a ticket
that had been obtained earlier.
|
| CVE-2015-1790 |
The PKCS7_dataDecodefunction in crypto/pkcs7/pk7_doit.c in OpenSSL
before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2
before 1.0.2b allows remote attackers to cause a denial of service
(NULL pointer dereference and application crash) via a PKCS#7 blob
that uses ASN.1 encoding and lacks inner EncryptedContent data.
|
| CVE-2015-1789 |
The X509_cmp_time function in crypto/x509/x509_vfy.c in OpenSSL before
0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before
1.0.2b allows remote attackers to cause a denial of service
(out-of-bounds read and application crash) via a crafted length field
in ASN1_TIME data, as demonstrated by an attack against a server that
supports client authentication with a custom verification callback.
|
| CVE-2015-1788 |
The BN_GF2m_mod_inv function in crypto/bn/bn_gf2m.c in OpenSSL before
0.9.8s, 1.0.0 before 1.0.0e, 1.0.1 before 1.0.1n, and 1.0.2 before
1.0.2b does not properly handle ECParameters structures in which the
curve is over a malformed binary polynomial field, which allows remote
attackers to cause a denial of service (infinite loop) via a session
that uses an Elliptic Curve algorithm, as demonstrated by an attack
against a server that supports client authentication.
|
| CVE-2015-1787 |
The ssl3_get_client_key_exchange function in s3_srvr.c in OpenSSL
1.0.2 before 1.0.2a, when client authentication and an ephemeral
Diffie-Hellman ciphersuite are enabled, allows remote attackers to
cause a denial of service (daemon crash) via a ClientKeyExchange
message with a length of zero.
|
| CVE-2015-0978 |
Multiple untrusted search path vulnerabilities in (1)
EQATEC.Analytics.Monitor.Win32_vc100.dll and (2)
EQATEC.Analytics.Monitor.Win32_vc100-x64.dll in Elipse E3 4.5.232
through 4.6.161 allow local users to gain privileges via a Trojan
horse DLL in an unspecified directory. NOTE: this may overlap
CVE-2015-2264.
|
| CVE-2015-0293 |
The SSLv2 implementation in OpenSSL before 0.9.8zf, 1.0.0 before
1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a allows remote
attackers to cause a denial of service (s2_lib.c assertion failure and
daemon exit) via a crafted CLIENT-MASTER-KEY message.
|
| CVE-2015-0292 |
Integer underflow in the EVP_DecodeUpdate function in
crypto/evp/encode.c in the base64-decoding implementation in OpenSSL
before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h allows
remote attackers to cause a denial of service (memory corruption) or
possibly have unspecified other impact via crafted base64 data that
triggers a buffer overflow.
|
| CVE-2015-0291 |
The sigalgs implementation in t1_lib.c in OpenSSL 1.0.2 before 1.0.2a
allows remote attackers to cause a denial of service (NULL pointer
dereference and daemon crash) by using an invalid signature_algorithms
extension in the ClientHello message during a renegotiation.
|
| CVE-2015-0290 |
The multi-block feature in the ssl3_write_bytes function in s3_pkt.c
in OpenSSL 1.0.2 before 1.0.2a on 64-bit x86 platforms with AES NI
support does not properly handle certain non-blocking I/O cases, which
allows remote attackers to cause a denial of service (pointer
corruption and application crash) via unspecified vectors.
|
| CVE-2015-0289 |
The PKCS#7 implementation in OpenSSL before 0.9.8zf, 1.0.0 before
1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a does not properly
handle a lack of outer ContentInfo, which allows attackers to cause a
denial of service (NULL pointer dereference and application crash) by
leveraging an application that processes arbitrary PKCS#7 data and
providing malformed data with ASN.1 encoding, related to
crypto/pkcs7/pk7_doit.c and crypto/pkcs7/pk7_lib.c.
|
| CVE-2015-0288 |
The X509_to_X509_REQ function in crypto/x509/x509_req.c in OpenSSL
before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2
before 1.0.2a might allow attackers to cause a denial of service (NULL
pointer dereference and application crash) via an invalid certificate
key.
|
| CVE-2015-0287 |
The ASN1_item_ex_d2i function in crypto/asn1/tasn_dec.c in OpenSSL
before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2
before 1.0.2a does not reinitialize CHOICE and ADB data structures,
which might allow attackers to cause a denial of service (invalid
write operation and memory corruption) by leveraging an application
that relies on ASN.1 structure reuse.
|
| CVE-2015-0286 |
The ASN1_TYPE_cmp function in crypto/asn1/a_type.c in OpenSSL before
0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before
1.0.2a does not properly perform boolean-type comparisons, which
allows remote attackers to cause a denial of service (invalid read
operation and application crash) via a crafted X.509 certificate to an
endpoint that uses the certificate-verification feature.
|
| CVE-2015-0285 |
The ssl3_client_hello function in s3_clnt.c in OpenSSL 1.0.2 before
1.0.2a does not ensure that the PRNG is seeded before proceeding with
a handshake, which makes it easier for remote attackers to defeat
cryptographic protection mechanisms by sniffing the network and then
conducting a brute-force attack.
|
| CVE-2015-0235 |
Heap-based buffer overflow in the __nss_hostname_digits_dots function
in glibc 2.2, and other 2.x versions before 2.18, allows
context-dependent attackers to execute arbitrary code via vectors
related to the (1) gethostbyname or (2) gethostbyname2 function, aka
"GHOST."
|
| CVE-2015-0209 |
Use-after-free vulnerability in the d2i_ECPrivateKey function in
crypto/ec/ec_asn1.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r,
1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a might allow remote
attackers to cause a denial of service (memory corruption and
application crash) or possibly have unspecified other impact via a
malformed Elliptic Curve (EC) private-key file that is improperly
handled during import.
|
| CVE-2015-0208 |
The ASN.1 signature-verification implementation in the rsa_item_verify
function in crypto/rsa/rsa_ameth.c in OpenSSL 1.0.2 before 1.0.2a
allows remote attackers to cause a denial of service (NULL pointer
dereference and application crash) via crafted RSA PSS parameters to
an endpoint that uses the certificate-verification feature.
|
| CVE-2015-0207 |
The dtls1_listen function in d1_lib.c in OpenSSL 1.0.2 before 1.0.2a
does not properly isolate the state information of independent data
streams, which allows remote attackers to cause a denial of service
(application crash) via crafted DTLS traffic, as demonstrated by DTLS
1.0 traffic to a DTLS 1.2 server.
|
| CVE-2015-0206 |
Memory leak in the dtls1_buffer_record function in d1_pkt.c in OpenSSL
1.0.0 before 1.0.0p and 1.0.1 before 1.0.1k allows remote attackers to
cause a denial of service (memory consumption) by sending many
duplicate records for the next epoch, leading to failure of replay
detection.
|
| CVE-2015-0205 |
The ssl3_get_cert_verify function in s3_srvr.c in OpenSSL 1.0.0 before
1.0.0p and 1.0.1 before 1.0.1k accepts client authentication with a
Diffie-Hellman (DH) certificate without requiring a CertificateVerify
message, which allows remote attackers to obtain access without
knowledge of a private key via crafted TLS Handshake Protocol traffic
to a server that recognizes a Certification Authority with DH support.
|
| CVE-2015-0204 |
The ssl3_get_key_exchange function in s3_clnt.c in OpenSSL before
0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote
SSL servers to conduct RSA-to-EXPORT_RSA downgrade attacks and
facilitate brute-force decryption by offering a weak ephemeral RSA key
in a noncompliant role, related to the "FREAK" issue. NOTE: the scope
of this CVE is only client code based on OpenSSL, not EXPORT_RSA
issues associated with servers or other TLS implementations.
|
| CVE-2014-8275 |
OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k
does not enforce certain constraints on certificate data, which allows
remote attackers to defeat a fingerprint-based certificate-blacklist
protection mechanism by including crafted data within a certificate's
unsigned portion, related to crypto/asn1/a_verify.c,
crypto/dsa/dsa_asn1.c, crypto/ecdsa/ecs_vrf.c, and
crypto/x509/x_all.c.
|
| CVE-2014-8176 |
The dtls1_clear_queues function in ssl/d1_lib.c in OpenSSL before
0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h frees data
structures without considering that application data can arrive
between a ChangeCipherSpec message and a Finished message, which
allows remote DTLS peers to cause a denial of service (memory
corruption and application crash) or possibly have unspecified other
impact via unexpected application data.
|
| CVE-2014-5139 |
The ssl_set_client_disabled function in t1_lib.c in OpenSSL 1.0.1
before 1.0.1i allows remote SSL servers to cause a denial of service
(NULL pointer dereference and client application crash) via a
ServerHello message that includes an SRP ciphersuite without the
required negotiation of that ciphersuite with the client.
|
| CVE-2014-4993 |
(1) lib/backup/cli/utility.rb in the backup-agoddard gem 3.0.28 and
(2) lib/backup/cli/utility.rb in the backup_checksum gem 3.0.23 for
Ruby place credentials on the openssl command line, which allows local
users to obtain sensitive information by listing the process.
|
| CVE-2014-3694 |
The (1) bundled GnuTLS SSL/TLS plugin and the (2) bundled OpenSSL
SSL/TLS plugin in libpurple in Pidgin before 2.10.10 do not properly
consider the Basic Constraints extension during verification of X.509
certificates from SSL servers, which allows man-in-the-middle
attackers to spoof servers and obtain sensitive information via a
crafted certificate.
|
| CVE-2014-3582 |
In Ambari 1.2.0 through 2.2.2, it may be possible to execute arbitrary
system commands on the Ambari Server host while generating SSL
certificates for hosts in an Ambari cluster.
|
| CVE-2014-3572 |
The ssl3_get_key_exchange function in s3_clnt.c in OpenSSL before
0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote
SSL servers to conduct ECDHE-to-ECDH downgrade attacks and trigger a
loss of forward secrecy by omitting the ServerKeyExchange message.
|
| CVE-2014-3571 |
OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k
allows remote attackers to cause a denial of service (NULL pointer
dereference and application crash) via a crafted DTLS message that is
processed with a different read operation for the handshake header
than for the handshake body, related to the dtls1_get_record function
in d1_pkt.c and the ssl3_read_n function in s3_pkt.c.
|
| CVE-2014-3570 |
The BN_sqr implementation in OpenSSL before 0.9.8zd, 1.0.0 before
1.0.0p, and 1.0.1 before 1.0.1k does not properly calculate the square
of a BIGNUM value, which might make it easier for remote attackers to
defeat cryptographic protection mechanisms via unspecified vectors,
related to crypto/bn/asm/mips.pl, crypto/bn/asm/x86_64-gcc.c, and
crypto/bn/bn_asm.c.
|
| CVE-2014-3569 |
The ssl23_get_client_hello function in s23_srvr.c in OpenSSL 0.9.8zc,
1.0.0o, and 1.0.1j does not properly handle attempts to use
unsupported protocols, which allows remote attackers to cause a denial
of service (NULL pointer dereference and daemon crash) via an
unexpected handshake, as demonstrated by an SSLv3 handshake to a
no-ssl3 application with certain error handling. NOTE: this issue
became relevant after the CVE-2014-3568 fix.
|
| CVE-2014-3568 |
OpenSSL before 0.9.8zc, 1.0.0 before 1.0.0o, and 1.0.1 before 1.0.1j
does not properly enforce the no-ssl3 build option, which allows
remote attackers to bypass intended access restrictions via an SSL 3.0
handshake, related to s23_clnt.c and s23_srvr.c.
|
| CVE-2014-3567 |
Memory leak in the tls_decrypt_ticket function in t1_lib.c in OpenSSL
before 0.9.8zc, 1.0.0 before 1.0.0o, and 1.0.1 before 1.0.1j allows
remote attackers to cause a denial of service (memory consumption) via
a crafted session ticket that triggers an integrity-check failure.
|
| CVE-2014-3566 |
The SSL protocol 3.0, as used in OpenSSL through 1.0.1i and other
products, uses nondeterministic CBC padding, which makes it easier for
man-in-the-middle attackers to obtain cleartext data via a
padding-oracle attack, aka the "POODLE" issue.
|
| CVE-2014-3513 |
Memory leak in d1_srtp.c in the DTLS SRTP extension in OpenSSL 1.0.1
before 1.0.1j allows remote attackers to cause a denial of service
(memory consumption) via a crafted handshake message.
|
| CVE-2014-3512 |
Multiple buffer overflows in crypto/srp/srp_lib.c in the SRP
implementation in OpenSSL 1.0.1 before 1.0.1i allow remote attackers
to cause a denial of service (application crash) or possibly have
unspecified other impact via an invalid SRP (1) g, (2) A, or (3) B
parameter.
|
| CVE-2014-3511 |
The ssl23_get_client_hello function in s23_srvr.c in OpenSSL 1.0.1
before 1.0.1i allows man-in-the-middle attackers to force the use of
TLS 1.0 by triggering ClientHello message fragmentation in
communication between a client and server that both support later TLS
versions, related to a "protocol downgrade" issue.
|
| CVE-2014-3510 |
The ssl3_send_client_key_exchange function in s3_clnt.c in OpenSSL
0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i
allows remote DTLS servers to cause a denial of service (NULL pointer
dereference and client application crash) via a crafted handshake
message in conjunction with a (1) anonymous DH or (2) anonymous ECDH
ciphersuite.
|
| CVE-2014-3509 |
Race condition in the ssl_parse_serverhello_tlsext function in
t1_lib.c in OpenSSL 1.0.0 before 1.0.0n and 1.0.1 before 1.0.1i, when
multithreading and session resumption are used, allows remote SSL
servers to cause a denial of service (memory overwrite and client
application crash) or possibly have unspecified other impact by
sending Elliptic Curve (EC) Supported Point Formats Extension data.
|
| CVE-2014-3508 |
The OBJ_obj2txt function in crypto/objects/obj_dat.c in OpenSSL 0.9.8
before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i, when
pretty printing is used, does not ensure the presence of '\0'
characters, which allows context-dependent attackers to obtain
sensitive information from process stack memory by reading output from
X509_name_oneline, X509_name_print_ex, and unspecified other
functions.
|
| CVE-2014-3507 |
Memory leak in d1_both.c in the DTLS implementation in OpenSSL 0.9.8
before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i allows
remote attackers to cause a denial of service (memory consumption) via
zero-length DTLS fragments that trigger improper handling of the
return value of a certain insert function.
|
| CVE-2014-3506 |
d1_both.c in the DTLS implementation in OpenSSL 0.9.8 before 0.9.8zb,
1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i allows remote attackers
to cause a denial of service (memory consumption) via crafted DTLS
handshake messages that trigger memory allocations corresponding to
large length values.
|
| CVE-2014-3505 |
Double free vulnerability in d1_both.c in the DTLS implementation in
OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before
1.0.1i allows remote attackers to cause a denial of service
(application crash) via crafted DTLS packets that trigger an error
condition.
|
| CVE-2014-3470 |
The ssl3_send_client_key_exchange function in s3_clnt.c in OpenSSL
before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h, when an
anonymous ECDH cipher suite is used, allows remote attackers to cause
a denial of service (NULL pointer dereference and client crash) by
triggering a NULL certificate value.
|
| CVE-2014-2734 |
** DISPUTED ** The openssl extension in Ruby 2.x does not properly
maintain the state of process memory after a file is reopened, which
allows remote attackers to spoof signatures within the context of a
Ruby script that attempts signature verification after performing a
certain sequence of filesystem operations. NOTE: this issue has been
disputed by the Ruby OpenSSL team and third parties, who state that
the original demonstration PoC contains errors and redundant or
unnecessarily-complex code that does not appear to be related to a
demonstration of the issue. As of 20140502, CVE is not aware of any
public comment by the original researcher.
|
| CVE-2014-2234 |
A certain Apple patch for OpenSSL in Apple OS X 10.9.2 and earlier
uses a Trust Evaluation Agent (TEA) feature without terminating
certain TLS/SSL handshakes as specified in the SSL_CTX_set_verify
callback function's documentation, which allows remote attackers to
bypass extra verification within a custom application via a crafted
certificate chain that is acceptable to TEA but not acceptable to that
application.
|
| CVE-2014-0224 |
OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h
does not properly restrict processing of ChangeCipherSpec messages,
which allows man-in-the-middle attackers to trigger use of a
zero-length master key in certain OpenSSL-to-OpenSSL communications,
and consequently hijack sessions or obtain sensitive information, via
a crafted TLS handshake, aka the "CCS Injection" vulnerability.
|
| CVE-2014-0221 |
The dtls1_get_message_fragment function in d1_both.c in OpenSSL before
0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h allows remote
attackers to cause a denial of service (recursion and client crash)
via a DTLS hello message in an invalid DTLS handshake.
|
| CVE-2014-0198 |
The do_ssl3_write function in s3_pkt.c in OpenSSL 1.x through 1.0.1g,
when SSL_MODE_RELEASE_BUFFERS is enabled, does not properly manage a
buffer pointer during certain recursive calls, which allows remote
attackers to cause a denial of service (NULL pointer dereference and
application crash) via vectors that trigger an alert condition.
|
| CVE-2014-0195 |
The dtls1_reassemble_fragment function in d1_both.c in OpenSSL before
0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not
properly validate fragment lengths in DTLS ClientHello messages, which
allows remote attackers to execute arbitrary code or cause a denial of
service (buffer overflow and application crash) via a long non-initial
fragment.
|
| CVE-2014-0160 |
The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before
1.0.1g do not properly handle Heartbeat Extension packets, which
allows remote attackers to obtain sensitive information from process
memory via crafted packets that trigger a buffer over-read, as
demonstrated by reading private keys, related to d1_both.c and
t1_lib.c, aka the Heartbleed bug.
|
| CVE-2014-0139 |
cURL and libcurl 7.1 before 7.36.0, when using the OpenSSL, axtls,
qsossl or gskit libraries for TLS, recognize a wildcard IP address in
the subject's Common Name (CN) field of an X.509 certificate, which
might allow man-in-the-middle attackers to spoof arbitrary SSL servers
via a crafted certificate issued by a legitimate Certification
Authority.
|
| CVE-2014-0076 |
The Montgomery ladder implementation in OpenSSL through 1.0.0l does
not ensure that certain swap operations have a constant-time behavior,
which makes it easier for local users to obtain ECDSA nonces via a
FLUSH+RELOAD cache side-channel attack.
|
| CVE-2014-0017 |
The RAND_bytes function in libssh before 0.6.3, when forking is
enabled, does not properly reset the state of the OpenSSL
pseudo-random number generator (PRNG), which causes the state to be
shared between children processes and allows local users to obtain
sensitive information by leveraging a pid collision.
|
| CVE-2014-0016 |
stunnel before 5.00, when using fork threading, does not properly
update the state of the OpenSSL pseudo-random number generator (PRNG),
which causes subsequent children with the same process ID to use the
same entropy pool and allows remote attackers to obtain private keys
for EC (ECDSA) or DSA certificates.
|
| CVE-2013-7373 |
Android before 4.4 does not properly arrange for seeding of the
OpenSSL PRNG, which makes it easier for attackers to defeat
cryptographic protection mechanisms by leveraging use of the PRNG
within multiple applications.
|
| CVE-2013-7295 |
Tor before 0.2.4.20, when OpenSSL 1.x is used in conjunction with a
certain HardwareAccel setting on Intel Sandy Bridge and Ivy Bridge
platforms, does not properly generate random numbers for (1) relay
identity keys and (2) hidden-service identity keys, which might make
it easier for remote attackers to bypass cryptographic protection
mechanisms via unspecified vectors.
|
| CVE-2013-6450 |
The DTLS retransmission implementation in OpenSSL 1.0.0 before 1.0.0l
and 1.0.1 before 1.0.1f does not properly maintain data structures for
digest and encryption contexts, which might allow man-in-the-middle
attackers to trigger the use of a different context and cause a denial
of service (application crash) by interfering with packet delivery,
related to ssl/d1_both.c and ssl/t1_enc.c.
|
| CVE-2013-6449 |
The ssl_get_algorithm2 function in ssl/s3_lib.c in OpenSSL before
1.0.2 obtains a certain version number from an incorrect data
structure, which allows remote attackers to cause a denial of service
(daemon crash) via crafted traffic from a TLS 1.2 client.
|
| CVE-2013-6420 |
The asn1_time_to_time_t function in ext/openssl/openssl.c in PHP
before 5.3.28, 5.4.x before 5.4.23, and 5.5.x before 5.5.7 does not
properly parse (1) notBefore and (2) notAfter timestamps in X.509
certificates, which allows remote attackers to execute arbitrary code
or cause a denial of service (memory corruption) via a crafted
certificate that is not properly handled by the openssl_x509_parse
function.
|
| CVE-2013-4548 |
The mm_newkeys_from_blob function in monitor_wrap.c in sshd in OpenSSH
6.2 and 6.3, when an AES-GCM cipher is used, does not properly
initialize memory for a MAC context data structure, which allows
remote authenticated users to bypass intended ForceCommand and
login-shell restrictions via packet data that provides a crafted
callback address.
|
| CVE-2013-4545 |
cURL and libcurl 7.18.0 through 7.32.0, when built with OpenSSL,
disables the certificate CN and SAN name field verification
(CURLOPT_SSL_VERIFYHOST) when the digital signature verification
(CURLOPT_SSL_VERIFYPEER) is disabled, which allows man-in-the-middle
attackers to spoof SSL servers via an arbitrary valid certificate.
|
| CVE-2013-4508 |
lighttpd before 1.4.34, when SNI is enabled, configures weak SSL
ciphers, which makes it easier for remote attackers to hijack sessions
by inserting packets into the client-server data stream or obtain
sensitive information by sniffing the network.
|
| CVE-2013-4425 |
The DICOM listener in OsiriX before 5.8 and before 2.5-MD, when
starting up, encrypts the TLS private key file using
"SuperSecretPassword" as the hardcoded password, which allows local
users to obtain the private key.
|
| CVE-2013-4353 |
The ssl3_take_mac function in ssl/s3_both.c in OpenSSL 1.0.1 before
1.0.1f allows remote TLS servers to cause a denial of service (NULL
pointer dereference and application crash) via a crafted Next Protocol
Negotiation record in a TLS handshake.
|
| CVE-2013-4248 |
The openssl_x509_parse function in openssl.c in the OpenSSL module in
PHP before 5.4.18 and 5.5.x before 5.5.2 does not properly handle a
'\0' character in a domain name in the Subject Alternative Name field
of an X.509 certificate, which allows man-in-the-middle attackers to
spoof arbitrary SSL servers via a crafted certificate issued by a
legitimate Certification Authority, a related issue to CVE-2009-2408.
|
| CVE-2013-4073 |
The OpenSSL::SSL.verify_certificate_identity function in
lib/openssl/ssl.rb in Ruby 1.8 before 1.8.7-p374, 1.9 before
1.9.3-p448, and 2.0 before 2.0.0-p247 does not properly handle a '\0'
character in a domain name in the Subject Alternative Name field of an
X.509 certificate, which allows man-in-the-middle attackers to spoof
arbitrary SSL servers via a crafted certificate issued by a legitimate
Certification Authority, a related issue to CVE-2009-2408.
|
| CVE-2013-2944 |
strongSwan 4.3.5 through 5.0.3, when using the OpenSSL plugin for
ECDSA signature verification, allows remote attackers to authenticate
as other users via an invalid signature.
|
| CVE-2013-1900 |
PostgreSQL 9.2.x before 9.2.4, 9.1.x before 9.1.9, 9.0.x before
9.0.13, and 8.4.x before 8.4.17, when using OpenSSL, generates
insufficiently random numbers, which might allow remote authenticated
users to have an unspecified impact via vectors related to the
"contrib/pgcrypto functions."
|
| CVE-2013-1654 |
Puppet 2.7.x before 2.7.21 and 3.1.x before 3.1.1, and Puppet
Enterprise 2.7.x before 2.7.2, does not properly negotiate the SSL
protocol between client and master, which allows remote attackers to
conduct SSLv2 downgrade attacks against SSLv3 sessions via unspecified
vectors.
|
| CVE-2013-0169 |
The TLS protocol 1.1 and 1.2 and the DTLS protocol 1.0 and 1.2, as
used in OpenSSL, OpenJDK, PolarSSL, and other products, do not
properly consider timing side-channel attacks on a MAC check
requirement during the processing of malformed CBC padding, which
allows remote attackers to conduct distinguishing attacks and
plaintext-recovery attacks via statistical analysis of timing data for
crafted packets, aka the "Lucky Thirteen" issue.
|
| CVE-2013-0166 |
OpenSSL before 0.9.8y, 1.0.0 before 1.0.0k, and 1.0.1 before 1.0.1d
does not properly perform signature verification for OCSP responses,
which allows remote OCSP servers to cause a denial of service (NULL
pointer dereference and application crash) via an invalid key.
|
| CVE-2012-6113 |
The openssl_encrypt function in ext/openssl/openssl.c in PHP 5.3.9
through 5.3.13 does not initialize a certain variable, which allows
remote attackers to obtain sensitive information from process memory
by providing zero bytes of input data.
|
| CVE-2012-6093 |
The QSslSocket::sslErrors function in Qt before 4.6.5, 4.7.x before
4.7.6, 4.8.x before 4.8.5, when using certain versions of openSSL,
uses an "incompatible structure layout" that can read memory from the
wrong location, which causes Qt to report an incorrect error when
certificate validation fails and might cause users to make unsafe
security decisions to accept a certificate.
|
| CVE-2012-4930 |
The SPDY protocol 3 and earlier, as used in Mozilla Firefox, Google
Chrome, and other products, can perform TLS encryption of compressed
data without properly obfuscating the length of the unencrypted data,
which allows man-in-the-middle attackers to obtain plaintext HTTP
headers by observing length differences during a series of guesses in
which a string in an HTTP request potentially matches an unknown
string in an HTTP header, aka a "CRIME" attack.
|
| CVE-2012-4929 |
The TLS protocol 1.2 and earlier, as used in Mozilla Firefox, Google
Chrome, Qt, and other products, can encrypt compressed data without
properly obfuscating the length of the unencrypted data, which allows
man-in-the-middle attackers to obtain plaintext HTTP headers by
observing length differences during a series of guesses in which a
string in an HTTP request potentially matches an unknown string in an
HTTP header, aka a "CRIME" attack.
|
| CVE-2012-2686 |
crypto/evp/e_aes_cbc_hmac_sha1.c in the AES-NI functionality in the
TLS 1.1 and 1.2 implementations in OpenSSL 1.0.1 before 1.0.1d allows
remote attackers to cause a denial of service (application crash) via
crafted CBC data.
|
| CVE-2012-2333 |
Integer underflow in OpenSSL before 0.9.8x, 1.0.0 before 1.0.0j, and
1.0.1 before 1.0.1c, when TLS 1.1, TLS 1.2, or DTLS is used with CBC
encryption, allows remote attackers to cause a denial of service
(buffer over-read) or possibly have unspecified other impact via a
crafted TLS packet that is not properly handled during a certain
explicit IV calculation.
|
| CVE-2012-2131 |
Multiple integer signedness errors in crypto/buffer/buffer.c in
OpenSSL 0.9.8v allow remote attackers to conduct buffer overflow
attacks, and cause a denial of service (memory corruption) or possibly
have unspecified other impact, via crafted DER data, as demonstrated
by an X.509 certificate or an RSA public key. NOTE: this vulnerability
exists because of an incomplete fix for CVE-2012-2110.
|
| CVE-2012-2110 |
The asn1_d2i_read_bio function in crypto/asn1/a_d2i_fp.c in OpenSSL
before 0.9.8v, 1.0.0 before 1.0.0i, and 1.0.1 before 1.0.1a does not
properly interpret integer data, which allows remote attackers to
conduct buffer overflow attacks, and cause a denial of service (memory
corruption) or possibly have unspecified other impact, via crafted DER
data, as demonstrated by an X.509 certificate or an RSA public key.
|
| CVE-2012-1165 |
The mime_param_cmp function in crypto/asn1/asn_mime.c in OpenSSL
before 0.9.8u and 1.x before 1.0.0h allows remote attackers to cause a
denial of service (NULL pointer dereference and application crash) via
a crafted S/MIME message, a different vulnerability than
CVE-2006-7250.
|
| CVE-2012-0884 |
The implementation of Cryptographic Message Syntax (CMS) and PKCS #7
in OpenSSL before 0.9.8u and 1.x before 1.0.0h does not properly
restrict certain oracle behavior, which makes it easier for
context-dependent attackers to decrypt data via a Million Message
Attack (MMA) adaptive chosen ciphertext attack.
|
| CVE-2012-0050 |
OpenSSL 0.9.8s and 1.0.0f does not properly support DTLS applications,
which allows remote attackers to cause a denial of service (crash) via
unspecified vectors related to an out-of-bounds read. NOTE: this
vulnerability exists because of an incorrect fix for CVE-2011-4108.
|
| CVE-2012-0027 |
The GOST ENGINE in OpenSSL before 1.0.0f does not properly handle
invalid parameters for the GOST block cipher, which allows remote
attackers to cause a denial of service (daemon crash) via crafted data
from a TLS client.
|
| CVE-2011-5095 |
The Diffie-Hellman key-exchange implementation in OpenSSL 0.9.8, when
FIPS mode is enabled, does not properly validate a public parameter,
which makes it easier for man-in-the-middle attackers to obtain the
shared secret key by modifying network traffic, a related issue to
CVE-2011-1923.
|
| CVE-2011-4619 |
The Server Gated Cryptography (SGC) implementation in OpenSSL before
0.9.8s and 1.x before 1.0.0f does not properly handle handshake
restarts, which allows remote attackers to cause a denial of service
(CPU consumption) via unspecified vectors.
|
| CVE-2011-4577 |
OpenSSL before 0.9.8s and 1.x before 1.0.0f, when RFC 3779 support is
enabled, allows remote attackers to cause a denial of service
(assertion failure) via an X.509 certificate containing
certificate-extension data associated with (1) IP address blocks or
(2) Autonomous System (AS) identifiers.
|
| CVE-2011-4576 |
The SSL 3.0 implementation in OpenSSL before 0.9.8s and 1.x before
1.0.0f does not properly initialize data structures for block cipher
padding, which might allow remote attackers to obtain sensitive
information by decrypting the padding data sent by an SSL peer.
|
| CVE-2011-4354 |
crypto/bn/bn_nist.c in OpenSSL before 0.9.8h on 32-bit platforms, as
used in stunnel and other products, in certain circumstances involving
ECDH or ECDHE cipher suites, uses an incorrect modular reduction
algorithm in its implementation of the P-256 and P-384 NIST elliptic
curves, which allows remote attackers to obtain the private key of a
TLS server via multiple handshake attempts.
|
| CVE-2011-4109 |
Double free vulnerability in OpenSSL 0.9.8 before 0.9.8s, when
X509_V_FLAG_POLICY_CHECK is enabled, allows remote attackers to have
an unspecified impact by triggering failure of a policy check.
|
| CVE-2011-4108 |
The DTLS implementation in OpenSSL before 0.9.8s and 1.x before 1.0.0f
performs a MAC check only if certain padding is valid, which makes it
easier for remote attackers to recover plaintext via a padding oracle
attack.
|
| CVE-2011-3210 |
The ephemeral ECDH ciphersuite functionality in OpenSSL 0.9.8 through
0.9.8r and 1.0.x before 1.0.0e does not ensure thread safety during
processing of handshake messages from clients, which allows remote
attackers to cause a denial of service (daemon crash) via out-of-order
messages that violate the TLS protocol.
|
| CVE-2011-3207 |
crypto/x509/x509_vfy.c in OpenSSL 1.0.x before 1.0.0e does not
initialize certain structure members, which makes it easier for remote
attackers to bypass CRL validation by using a nextUpdate value
corresponding to a time in the past.
|
| CVE-2011-1945 |
The elliptic curve cryptography (ECC) subsystem in OpenSSL 1.0.0d and
earlier, when the Elliptic Curve Digital Signature Algorithm (ECDSA)
is used for the ECDHE_ECDSA cipher suite, does not properly implement
curves over binary fields, which makes it easier for context-dependent
attackers to determine private keys via a timing attack and a lattice
calculation.
|
| CVE-2011-1473 |
** DISPUTED ** OpenSSL before 0.9.8l, and 0.9.8m through 1.x, does not
properly restrict client-initiated renegotiation within the SSL and
TLS protocols, which might make it easier for remote attackers to
cause a denial of service (CPU consumption) by performing many
renegotiations within a single connection, a different vulnerability
than CVE-2011-5094. NOTE: it can also be argued that it is the
responsibility of server deployments, not a security library, to
prevent or limit renegotiation when it is inappropriate within a
specific environment.
|
| CVE-2011-1468 |
Multiple memory leaks in the OpenSSL extension in PHP before 5.3.6
might allow remote attackers to cause a denial of service (memory
consumption) via (1) plaintext data to the openssl_encrypt function or
(2) ciphertext data to the openssl_decrypt function.
|
| CVE-2011-0014 |
ssl/t1_lib.c in OpenSSL 0.9.8h through 0.9.8q and 1.0.0 through 1.0.0c
allows remote attackers to cause a denial of service (crash), and
possibly obtain sensitive information in applications that use
OpenSSL, via a malformed ClientHello handshake message that triggers
an out-of-bounds memory access, aka "OCSP stapling vulnerability."
|
| CVE-2010-5298 |
Race condition in the ssl3_read_bytes function in s3_pkt.c in OpenSSL
through 1.0.1g, when SSL_MODE_RELEASE_BUFFERS is enabled, allows
remote attackers to inject data across sessions or cause a denial of
service (use-after-free and parsing error) via an SSL connection in a
multithreaded environment.
|
| CVE-2010-5111 |
Multiple buffer overflows in readline.c in Echoping 6.0.2 allow remote
attackers to cause a denial of service (crash) and possibly execute
arbitrary code via a crafted reply in the (1) TLS_readline or (2)
SSL_readline function, related to the EchoPingHttps Smokeping probe.
|
| CVE-2010-4252 |
OpenSSL before 1.0.0c, when J-PAKE is enabled, does not properly
validate the public parameters in the J-PAKE protocol, which allows
remote attackers to bypass the need for knowledge of the shared
secret, and successfully authenticate, by sending crafted values in
each round of the protocol.
|
| CVE-2010-4180 |
OpenSSL before 0.9.8q, and 1.0.x before 1.0.0c, when
SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG is enabled, does not properly
prevent modification of the ciphersuite in the session cache, which
allows remote attackers to force the downgrade to an unintended cipher
via vectors involving sniffing network traffic to discover a session
identifier.
|
| CVE-2010-3864 |
Multiple race conditions in ssl/t1_lib.c in OpenSSL 0.9.8f through
0.9.8o, 1.0.0, and 1.0.0a, when multi-threading and internal caching
are enabled on a TLS server, might allow remote attackers to execute
arbitrary code via client data that triggers a heap-based buffer
overflow, related to (1) the TLS server name extension and (2)
elliptic curve cryptography.
|
| CVE-2010-2939 |
Double free vulnerability in the ssl3_get_key_exchange function in the
OpenSSL client (ssl/s3_clnt.c) in OpenSSL 1.0.0a, 0.9.8, 0.9.7, and
possibly other versions, when using ECDH, allows context-dependent
attackers to cause a denial of service (crash) and possibly execute
arbitrary code via a crafted private key with an invalid prime. NOTE:
some sources refer to this as a use-after-free issue.
|
| CVE-2010-1633 |
RSA verification recovery in the EVP_PKEY_verify_recover function in
OpenSSL 1.x before 1.0.0a, as used by pkeyutl and possibly other
applications, returns uninitialized memory upon failure, which might
allow context-dependent attackers to bypass intended key requirements
or obtain sensitive information via unspecified vectors. NOTE: some of
these details are obtained from third party information.
|
| CVE-2010-1378 |
OpenSSL in Apple Mac OS X 10.6.x before 10.6.5 does not properly
perform arithmetic, which allows remote attackers to bypass X.509
certificate authentication via an arbitrary certificate issued by a
legitimate Certification Authority.
|
| CVE-2010-0928 |
OpenSSL 0.9.8i on the Gaisler Research LEON3 SoC on the Xilinx
Virtex-II Pro FPGA uses a Fixed Width Exponentiation (FWE) algorithm
for certain signature calculations, and does not verify the signature
before providing it to a caller, which makes it easier for physically
proximate attackers to determine the private key via a modified supply
voltage for the microprocessor, related to a "fault-based attack."
|
| CVE-2010-0742 |
The Cryptographic Message Syntax (CMS) implementation in
crypto/cms/cms_asn1.c in OpenSSL before 0.9.8o and 1.x before 1.0.0a
does not properly handle structures that contain OriginatorInfo, which
allows context-dependent attackers to modify invalid memory locations
or conduct double-free attacks, and possibly execute arbitrary code,
via unspecified vectors.
|
| CVE-2010-0740 |
The ssl3_get_record function in ssl/s3_pkt.c in OpenSSL 0.9.8f through
0.9.8m allows remote attackers to cause a denial of service (crash)
via a malformed record in a TLS connection that triggers a NULL
pointer dereference, related to the minor version number. NOTE: some
of these details are obtained from third party information.
|
| CVE-2010-0433 |
The kssl_keytab_is_available function in ssl/kssl.c in OpenSSL before
0.9.8n, when Kerberos is enabled but Kerberos configuration files
cannot be opened, does not check a certain return value, which allows
remote attackers to cause a denial of service (NULL pointer
dereference and daemon crash) via SSL cipher negotiation, as
demonstrated by a chroot installation of Dovecot or stunnel without
Kerberos configuration files inside the chroot.
|
| CVE-2009-5057 |
The S/MIME feature in Open Ticket Request System (OTRS) before 2.3.4
does not configure the RANDFILE and HOME environment variables for
OpenSSL, which might make it easier for remote attackers to decrypt
e-mail messages that had lower than intended entropy available for
cryptographic operations, related to inability to write to the seeding
file.
|
| CVE-2009-4355 |
Memory leak in the zlib_stateful_finish function in
crypto/comp/c_zlib.c in OpenSSL 0.9.8l and earlier and 1.0.0 Beta
through Beta 4 allows remote attackers to cause a denial of service
(memory consumption) via vectors that trigger incorrect calls to the
CRYPTO_cleanup_all_ex_data function, as demonstrated by use of SSLv3
and PHP with the Apache HTTP Server, a related issue to CVE-2008-1678.
|
| CVE-2009-4211 |
The U.S. Defense Information Systems Agency (DISA) Security Readiness
Review (SRR) script for the Solaris x86 platform executes files in
arbitrary directories as root for filenames equal to (1) java, (2)
openssl, (3) php, (4) snort, (5) tshark, (6) vncserver, or (7)
wireshark, which allows local users to gain privileges via a Trojan
horse program.
|
| CVE-2009-4028 |
The vio_verify_callback function in viosslfactories.c in MySQL 5.0.x
before 5.0.88 and 5.1.x before 5.1.41, when OpenSSL is used, accepts a
value of zero for the depth of X.509 certificates, which allows
man-in-the-middle attackers to spoof arbitrary SSL-based MySQL servers
via a crafted certificate, as demonstrated by a certificate presented
by a server linked against the yaSSL library.
|
| CVE-2009-3942 |
Martin Lambers msmtp before 1.4.19, when OpenSSL is used, does not
properly handle a '\0' character in a domain name in the (1) subject's
Common Name or (2) Subject Alternative Name field of an X.509
certificate, which allows man-in-the-middle attackers to spoof
arbitrary SSL servers via a crafted certificate issued by a legitimate
Certification Authority, a related issue to CVE-2009-2408.
|
| CVE-2009-3941 |
Martin Lambers mpop before 1.0.19, when OpenSSL is used, does not
properly handle a '\0' character in a domain name in the (1) subject's
Common Name or (2) Subject Alternative Name field of an X.509
certificate, which allows man-in-the-middle attackers to spoof
arbitrary SSL servers via a crafted certificate issued by a legitimate
Certification Authority, a related issue to CVE-2009-2408.
|
| CVE-2009-3767 |
libraries/libldap/tls_o.c in OpenLDAP 2.2 and 2.4, and possibly other
versions, when OpenSSL is used, does not properly handle a '\0'
character in a domain name in the subject's Common Name (CN) field of
an X.509 certificate, which allows man-in-the-middle attackers to
spoof arbitrary SSL servers via a crafted certificate issued by a
legitimate Certification Authority, a related issue to CVE-2009-2408.
|
| CVE-2009-3766 |
mutt_ssl.c in mutt 1.5.16 and other versions before 1.5.19, when
OpenSSL is used, does not verify the domain name in the subject's
Common Name (CN) field of an X.509 certificate, which allows
man-in-the-middle attackers to spoof SSL servers via an arbitrary
valid certificate.
|
| CVE-2009-3765 |
mutt_ssl.c in mutt 1.5.19 and 1.5.20, when OpenSSL is used, does not
properly handle a '\0' character in a domain name in the subject's
Common Name (CN) field of an X.509 certificate, which allows
man-in-the-middle attackers to spoof arbitrary SSL servers via a
crafted certificate issued by a legitimate Certification Authority, a
related issue to CVE-2009-2408.
|
| CVE-2009-3555 |
The TLS protocol, and the SSL protocol 3.0 and possibly earlier, as
used in Microsoft Internet Information Services (IIS) 7.0, mod_ssl in
the Apache HTTP Server 2.2.14 and earlier, OpenSSL before 0.9.8l,
GnuTLS 2.8.5 and earlier, Mozilla Network Security Services (NSS)
3.12.4 and earlier, multiple Cisco products, and other products, does
not properly associate renegotiation handshakes with an existing
connection, which allows man-in-the-middle attackers to insert data
into HTTPS sessions, and possibly other types of sessions protected by
TLS or SSL, by sending an unauthenticated request that is processed
retroactively by a server in a post-renegotiation context, related to
a "plaintext injection" attack, aka the "Project Mogul" issue.
|
| CVE-2009-3245 |
OpenSSL before 0.9.8m does not check for a NULL return value from
bn_wexpand function calls in (1) crypto/bn/bn_div.c, (2)
crypto/bn/bn_gf2m.c, (3) crypto/ec/ec2_smpl.c, and (4)
engines/e_ubsec.c, which has unspecified impact and context-dependent
attack vectors.
|
| CVE-2009-2474 |
neon before 0.28.6, when OpenSSL or GnuTLS is used, does not properly
handle a '\0' character in a domain name in the subject's Common Name
(CN) field of an X.509 certificate, which allows man-in-the-middle
attackers to spoof arbitrary SSL servers via a crafted certificate
issued by a legitimate Certification Authority, a related issue to
CVE-2009-2408.
|
| CVE-2009-2417 |
lib/ssluse.c in cURL and libcurl 7.4 through 7.19.5, when OpenSSL is
used, does not properly handle a '\0' character in a domain name in
the subject's Common Name (CN) field of an X.509 certificate, which
allows man-in-the-middle attackers to spoof arbitrary SSL servers via
a crafted certificate issued by a legitimate Certification Authority,
a related issue to CVE-2009-2408.
|
| CVE-2009-2409 |
The Network Security Services (NSS) library before 3.12.3, as used in
Firefox; GnuTLS before 2.6.4 and 2.7.4; OpenSSL 0.9.8 through 0.9.8k;
and other products support MD2 with X.509 certificates, which might
allow remote attackers to spoof certificates by using MD2 design flaws
to generate a hash collision in less than brute-force time. NOTE: the
scope of this issue is currently limited because the amount of
computation required is still large.
|
| CVE-2009-1390 |
Mutt 1.5.19, when linked against (1) OpenSSL (mutt_ssl.c) or (2)
GnuTLS (mutt_ssl_gnutls.c), allows connections when only one TLS
certificate in the chain is accepted instead of verifying the entire
chain, which allows remote attackers to spoof trusted servers via a
man-in-the-middle attack.
|
| CVE-2009-1387 |
The dtls1_retrieve_buffered_fragment function in ssl/d1_both.c in
OpenSSL before 1.0.0 Beta 2 allows remote attackers to cause a denial
of service (NULL pointer dereference and daemon crash) via an
out-of-sequence DTLS handshake message, related to a "fragment bug."
|
| CVE-2009-1386 |
ssl/s3_pkt.c in OpenSSL before 0.9.8i allows remote attackers to cause
a denial of service (NULL pointer dereference and daemon crash) via a
DTLS ChangeCipherSpec packet that occurs before ClientHello.
|
| CVE-2009-1379 |
Use-after-free vulnerability in the dtls1_retrieve_buffered_fragment
function in ssl/d1_both.c in OpenSSL 1.0.0 Beta 2 allows remote
attackers to cause a denial of service (openssl s_client crash) and
possibly have unspecified other impact via a DTLS packet, as
demonstrated by a packet from a server that uses a crafted server
certificate.
|
| CVE-2009-1378 |
Multiple memory leaks in the dtls1_process_out_of_seq_message function
in ssl/d1_both.c in OpenSSL 0.9.8k and earlier 0.9.8 versions allow
remote attackers to cause a denial of service (memory consumption) via
DTLS records that (1) are duplicates or (2) have sequence numbers much
greater than current sequence numbers, aka "DTLS fragment handling
memory leak."
|
| CVE-2009-1377 |
The dtls1_buffer_record function in ssl/d1_pkt.c in OpenSSL 0.9.8k and
earlier 0.9.8 versions allows remote attackers to cause a denial of
service (memory consumption) via a large series of "future epoch" DTLS
records that are buffered in a queue, aka "DTLS record buffer
limitation bug."
|
| CVE-2009-1252 |
Stack-based buffer overflow in the crypto_recv function in
ntp_crypto.c in ntpd in NTP before 4.2.4p7 and 4.2.5 before 4.2.5p74,
when OpenSSL and autokey are enabled, allows remote attackers to
execute arbitrary code via a crafted packet containing an extension
field.
|
| CVE-2009-0789 |
OpenSSL before 0.9.8k on WIN64 and certain other platforms does not
properly handle a malformed ASN.1 structure, which allows remote
attackers to cause a denial of service (invalid memory access and
application crash) by placing this structure in the public key of a
certificate, as demonstrated by an RSA public key.
|
| CVE-2009-0653 |
OpenSSL, probably 0.9.6, does not verify the Basic Constraints for an
intermediate CA-signed certificate, which allows remote attackers to
spoof the certificates of trusted sites via a man-in-the-middle
attack, a related issue to CVE-2002-0970.
|
| CVE-2009-0642 |
ext/openssl/ossl_ocsp.c in Ruby 1.8 and 1.9 does not properly check
the return value from the OCSP_basic_verify function, which might
allow remote attackers to successfully present an invalid X.509
certificate, possibly involving a revoked certificate.
|
| CVE-2009-0591 |
The CMS_verify function in OpenSSL 0.9.8h through 0.9.8j, when CMS is
enabled, does not properly handle errors associated with malformed
signed attributes, which allows remote attackers to repudiate a
signature that originally appeared to be valid but was actually
invalid.
|
| CVE-2009-0590 |
The ASN1_STRING_print_ex function in OpenSSL before 0.9.8k allows
remote attackers to cause a denial of service (invalid memory access
and application crash) via vectors that trigger printing of a (1)
BMPString or (2) UniversalString with an invalid encoded length.
|
| CVE-2009-0265 |
Internet Systems Consortium (ISC) BIND 9.6.0 and earlier does not
properly check the return value from the OpenSSL EVP_VerifyFinal
function, which allows remote attackers to bypass validation of the
certificate chain via a malformed SSL/TLS signature, a similar
vulnerability to CVE-2008-5077 and CVE-2009-0025.
|
| CVE-2009-0130 |
** DISPUTED ** lib/crypto/c_src/crypto_drv.c in erlang does not
properly check the return value from the OpenSSL DSA_do_verify
function, which might allow remote attackers to bypass validation of
the certificate chain via a malformed SSL/TLS signature, a similar
vulnerability to CVE-2008-5077. NOTE: a package maintainer disputes
this issue, reporting that there is a proper check within the only
code that uses the applicable part of crypto_drv.c, and thus "this
report is invalid."
|
| CVE-2009-0129 |
libcrypt-openssl-dsa-perl does not properly check the return value
from the OpenSSL DSA_verify and DSA_do_verify functions, which might
allow remote attackers to bypass validation of the certificate chain
via a malformed SSL/TLS signature, a similar vulnerability to
CVE-2008-5077.
|
| CVE-2009-0128 |
plugins/crypto/openssl/crypto_openssl.c in Simple Linux Utility for
Resource Management (aka SLURM or slurm-llnl) does not properly check
the return value from the OpenSSL EVP_VerifyFinal function, which
allows remote attackers to bypass validation of the certificate chain
via a malformed SSL/TLS signature, a similar vulnerability to
CVE-2008-5077.
|
| CVE-2009-0127 |
** DISPUTED ** M2Crypto does not properly check the return value from
the OpenSSL EVP_VerifyFinal, DSA_verify, ECDSA_verify, DSA_do_verify,
and ECDSA_do_verify functions, which might allow remote attackers to
bypass validation of the certificate chain via a malformed SSL/TLS
signature, a similar vulnerability to CVE-2008-5077. NOTE: a Linux
vendor disputes the relevance of this report to the M2Crypto product
because "these functions are not used anywhere in m2crypto."
|
| CVE-2009-0126 |
The decrypt_public function in lib/crypt.cpp in the client in Berkeley
Open Infrastructure for Network Computing (BOINC) 6.2.14 and 6.4.5
does not check the return value from the OpenSSL RSA_public_decrypt
function, which allows remote attackers to bypass validation of the
certificate chain via a malformed SSL/TLS signature, a similar
vulnerability to CVE-2008-5077.
|
| CVE-2009-0125 |
** DISPUTED **
NOTE: this issue has been disputed by the upstream vendor.
nasl/nasl_crypto2.c in the Nessus Attack Scripting Language library
(aka libnasl) 2.2.11 does not properly check the return value from the
OpenSSL DSA_do_verify function, which allows remote attackers to
bypass validation of the certificate chain via a malformed SSL/TLS
signature, a similar vulnerability to CVE-2008-5077. NOTE: the
upstream vendor has disputed this issue, stating "while we do misuse
this function (this is a bug), it has absolutely no security
ramification."
|
| CVE-2009-0124 |
The tqsl_verifyDataBlock function in openssl_cert.cpp in American
Radio Relay League (ARRL) tqsllib 2.0 does not properly check the
return value from the OpenSSL EVP_VerifyFinal function, which allows
remote attackers to bypass validation of the certificate chain via a
malformed SSL/TLS signature, a similar vulnerability to CVE-2008-5077.
|
| CVE-2009-0051 |
ZXID 0.29 and earlier does not properly check the return value from
the OpenSSL DSA_verify function, which allows remote attackers to
bypass validation of the certificate chain via a malformed SSL/TLS
signature, a similar vulnerability to CVE-2008-5077.
|
| CVE-2009-0050 |
Lasso 2.2.1 and earlier does not properly check the return value from
the OpenSSL DSA_verify function, which allows remote attackers to
bypass validation of the certificate chain via a malformed SSL/TLS
signature, a similar vulnerability to CVE-2008-5077.
|
| CVE-2009-0049 |
Belgian eID middleware (eidlib) 2.6.0 and earlier does not properly
check the return value from the OpenSSL EVP_VerifyFinal function,
which allows remote attackers to bypass validation of the certificate
chain via a malformed SSL/TLS signature for DSA and ECDSA keys, a
similar vulnerability to CVE-2008-5077.
|
| CVE-2009-0048 |
OpenEvidence 1.0.6 and earlier does not properly check the return
value from the OpenSSL EVP_VerifyFinal function, which allows remote
attackers to bypass validation of the certificate chain via a
malformed SSL/TLS signature for DSA and ECDSA keys, a similar
vulnerability to CVE-2008-5077.
|
| CVE-2009-0047 |
Gale 0.99 and earlier does not properly check the return value from
the OpenSSL EVP_VerifyFinal function, which allows remote attackers to
bypass validation of the certificate chain via a malformed SSL/TLS
signature for DSA and ECDSA keys, a similar vulnerability to
CVE-2008-5077.
|
| CVE-2009-0046 |
Sun GridEngine 5.3 and earlier does not properly check the return
value from the OpenSSL EVP_VerifyFinal function, which allows remote
attackers to bypass validation of the certificate chain via a
malformed SSL/TLS signature for DSA and ECDSA keys, a similar
vulnerability to CVE-2008-5077.
|
| CVE-2009-0025 |
BIND 9.6.0, 9.5.1, 9.5.0, 9.4.3, and earlier does not properly check
the return value from the OpenSSL DSA_verify function, which allows
remote attackers to bypass validation of the certificate chain via a
malformed SSL/TLS signature, a similar vulnerability to CVE-2008-5077.
|
| CVE-2009-0021 |
NTP 4.2.4 before 4.2.4p5 and 4.2.5 before 4.2.5p150 does not properly
check the return value from the OpenSSL EVP_VerifyFinal function,
which allows remote attackers to bypass validation of the certificate
chain via a malformed SSL/TLS signature for DSA and ECDSA keys, a
similar vulnerability to CVE-2008-5077.
|
| CVE-2008-7278 |
The S/MIME feature in Open Ticket Request System (OTRS) before 2.2.5,
and 2.3.x before 2.3.0-beta1, does not properly configure the RANDFILE
environment variable for OpenSSL, which might make it easier for
remote attackers to decrypt e-mail messages that had lower than
intended entropy available for cryptographic operations, related to
inability to write to the seeding file.
|
| CVE-2008-7270 |
OpenSSL before 0.9.8j, when SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG is
enabled, does not prevent modification of the ciphersuite in the
session cache, which allows remote attackers to force the use of a
disabled cipher via vectors involving sniffing network traffic to
discover a session identifier, a different vulnerability than
CVE-2010-4180.
|
| CVE-2008-5410 |
The PK11_SESSION cache in the OpenSSL PKCS#11 engine in Sun Solaris 10
does not maintain reference counts for operations with asymmetric
keys, which allows context-dependent attackers to cause a denial of
service (failed cryptographic operations) via unspecified vectors,
related to the (1) RSA_sign and (2) RSA_verify functions.
|
| CVE-2008-5077 |
OpenSSL 0.9.8i and earlier does not properly check the return value
from the EVP_VerifyFinal function, which allows remote attackers to
bypass validation of the certificate chain via a malformed SSL/TLS
signature for DSA and ECDSA keys.
|
| CVE-2008-4101 |
Vim 3.0 through 7.x before 7.2.010 does not properly escape
characters, which allows user-assisted attackers to (1) execute
arbitrary shell commands by entering a K keystroke on a line that
contains a ";" (semicolon) followed by a command, or execute arbitrary
Ex commands by entering an argument after a (2) "Ctrl-]" (control
close-square-bracket) or (3) "g]" (g close-square-bracket) keystroke
sequence, a different issue than CVE-2008-2712.
|
| CVE-2008-3432 |
Heap-based buffer overflow in the mch_expand_wildcards function in
os_unix.c in Vim 6.2 and 6.3 allows user-assisted attackers to execute
arbitrary code via shell metacharacters in filenames, as demonstrated
by the netrw.v3 test case.
|
| CVE-2008-2712 |
Vim 7.1.314, 6.4, and other versions allows user-assisted remote
attackers to execute arbitrary commands via Vim scripts that do not
properly sanitize inputs before invoking the execute or system
functions, as demonstrated using (1) filetype.vim, (3) xpm.vim, (4)
gzip_vim, and (5) netrw. NOTE: the originally reported version was
7.1.314, but the researcher actually found this set of issues in
7.1.298. NOTE: the zipplugin issue (originally vector 2 in this
identifier) has been subsumed by CVE-2008-3075.
|
| CVE-2008-2543 |
The ooh323 channel driver in Asterisk Addons 1.2.x before 1.2.9 and
Asterisk-Addons 1.4.x before 1.4.7 creates a remotely accessible TCP
port that is intended solely for localhost communication, and
interprets some TCP application-data fields as addresses of memory to
free, which allows remote attackers to cause a denial of service
(daemon crash) via crafted TCP packets.
|
| CVE-2008-1678 |
Memory leak in the zlib_stateful_init function in crypto/comp/c_zlib.c
in libssl in OpenSSL 0.9.8f through 0.9.8h allows remote attackers to
cause a denial of service (memory consumption) via multiple calls, as
demonstrated by initial SSL client handshakes to the Apache HTTP
Server mod_ssl that specify a compression algorithm.
|
| CVE-2008-1672 |
OpenSSL 0.9.8f and 0.9.8g allows remote attackers to cause a denial of
service (crash) via a TLS handshake that omits the Server Key Exchange
message and uses "particular cipher suites," which triggers a NULL
pointer dereference.
|
| CVE-2008-0891 |
Double free vulnerability in OpenSSL 0.9.8f and 0.9.8g, when the TLS
server name extensions are enabled, allows remote attackers to cause a
denial of service (crash) via a malformed Client Hello packet. NOTE:
some of these details are obtained from third party information.
|
| CVE-2008-0166 |
OpenSSL 0.9.8c-1 up to versions before 0.9.8g-9 on Debian-based
operating systems uses a random number generator that generates
predictable numbers, which makes it easier for remote attackers to
conduct brute force guessing attacks against cryptographic keys.
|
| CVE-2007-5536 |
Unspecified vulnerability in OpenSSL before A.00.09.07l on HP-UX
B.11.11, B.11.23, and B.11.31 allows local users to cause a denial of
service via unspecified vectors.
|
| CVE-2007-5502 |
The PRNG implementation for the OpenSSL FIPS Object Module 1.1.1 does
not perform auto-seeding during the FIPS self-test, which generates
random data that is more predictable than expected and makes it easier
for attackers to bypass protection mechanisms that rely on the
randomness.
|
| CVE-2007-5135 |
Off-by-one error in the SSL_get_shared_ciphers function in OpenSSL
0.9.7 up to 0.9.7l, and 0.9.8 up to 0.9.8f, might allow remote
attackers to execute arbitrary code via a crafted packet that triggers
a one-byte buffer underflow. NOTE: this issue was introduced as a
result of a fix for CVE-2006-3738. As of 20071012, it is unknown
whether code execution is possible.
|
| CVE-2007-4995 |
Off-by-one error in the DTLS implementation in OpenSSL 0.9.8 before
0.9.8f allows remote attackers to execute arbitrary code via
unspecified vectors.
|
| CVE-2007-4931 |
HP System Management Homepage (SMH) for Windows, when used in
conjunction with HP Version Control Agent or Version Control
Repository Manager, leaves old OpenSSL software active after an
OpenSSL update, which has unknown impact and attack vectors, probably
related to previous vulnerabilities for OpenSSL.
|
| CVE-2007-3108 |
The BN_from_montgomery function in crypto/bn/bn_mont.c in OpenSSL
0.9.8e and earlier does not properly perform Montgomery
multiplication, which might allow local users to conduct a
side-channel attack and retrieve RSA private keys.
|
| CVE-2007-2953 |
Format string vulnerability in the helptags_one function in
src/ex_cmds.c in Vim 6.4 and earlier, and 7.x up to 7.1, allows
user-assisted remote attackers to execute arbitrary code via format
string specifiers in a help-tags tag in a help file, related to the
helptags command.
|
| CVE-2006-7250 |
The mime_hdr_cmp function in crypto/asn1/asn_mime.c in OpenSSL 0.9.8t
and earlier allows remote attackers to cause a denial of service (NULL
pointer dereference and application crash) via a crafted S/MIME
message.
|
| CVE-2006-7249 |
** REJECT **
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2006-7250,
CVE-2012-1410. Reason: this candidate was intended for one issue, but
CVE users may have associated it with multiple unrelated issues.
Notes: All CVE users should consult CVE-2006-7250 for the OpenSSL
candidate or CVE-2012-1410 for the Kadu candidate. All references and
descriptions in this candidate have been removed to prevent accidental
usage.
|
| CVE-2006-7248 |
** REJECT **
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2006-7250,
CVE-2012-1410. Reason: this candidate was intended for one issue, but
CVE users may have associated it with multiple unrelated issues.
Notes: All CVE users should consult CVE-2006-7250 for the OpenSSL
candidate or CVE-2012-1410 for the Kadu candidate. All references and
descriptions in this candidate have been removed to prevent accidental
usage.
|
| CVE-2006-4343 |
The get_server_hello function in the SSLv2 client code in OpenSSL
0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions allows
remote servers to cause a denial of service (client crash) via unknown
vectors that trigger a null pointer dereference.
|
| CVE-2006-4339 |
OpenSSL before 0.9.7, 0.9.7 before 0.9.7k, and 0.9.8 before 0.9.8c,
when using an RSA key with exponent 3, removes PKCS-1 padding before
generating a hash, which allows remote attackers to forge a PKCS #1
v1.5 signature that is signed by that RSA key and prevents OpenSSL
from correctly verifying X.509 and other certificates that use PKCS #1.
|
| CVE-2006-3738 |
Buffer overflow in the SSL_get_shared_ciphers function in OpenSSL
0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions has
unspecified impact and remote attack vectors involving a long list of
ciphers.
|
| CVE-2006-3419 |
Tor before 0.1.1.20 uses OpenSSL pseudo-random bytes
(RAND_pseudo_bytes) instead of cryptographically strong RAND_bytes,
and seeds the entropy value at start-up with 160-bit chunks without
reseeding, which makes it easier for attackers to conduct brute force
guessing attacks.
|
| CVE-2006-2940 |
OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions
allows attackers to cause a denial of service (CPU consumption) via
parasitic public keys with large (1) "public exponent" or (2) "public
modulus" values in X.509 certificates that require extra time to
process when using RSA signature verification.
|
| CVE-2006-2937 |
OpenSSL 0.9.7 before 0.9.7l and 0.9.8 before 0.9.8d allows remote
attackers to cause a denial of service (infinite loop and memory
consumption) via malformed ASN.1 structures that trigger an improperly
handled error condition.
|
| CVE-2006-1599 |
Unspecified vulnerability in VCEngine.php in v-creator before
1.3-pre3, when the VC_CRYPTO_METHOD option is OPENSSL, allows remote
attackers to execute arbitrary commands, possibly due to problems in
the (1) encrypt and (2) decrypt functions.
|
| CVE-2005-2995 |
bacula 1.36.3 and earlier allows local users to modify or read
sensitive files via symlink attacks on (1) the temporary file used by
autoconf/randpass when openssl is not available, or (2) the mtx.[PID]
temporary file in mtx-changer.in.
|
| CVE-2005-2969 |
The SSL/TLS server implementation in OpenSSL 0.9.7 before 0.9.7h and
0.9.8 before 0.9.8a, when using the SSL_OP_MSIE_SSLV2_RSA_PADDING
option, disables a verification step that is required for preventing
protocol version rollback attacks, which allows remote attackers to
force a client and server to use a weaker protocol than needed via a
man-in-the-middle attack.
|
| CVE-2005-2946 |
The default configuration on OpenSSL before 0.9.8 uses MD5 for
creating message digests instead of a more cryptographically strong
algorithm, which makes it easier for remote attackers to forge
certificates with a valid certificate authority signature.
|
| CVE-2005-2532 |
OpenVPN before 2.0.1 does not properly flush the OpenSSL error queue
when a packet can not be decrypted by the server, which allows remote
authenticated attackers to cause a denial of service (client
disconnection) via a large number of packets that can not be
decrypted.
|
| CVE-2005-2531 |
OpenVPN before 2.0.1, when running with "verb 0" and without TLS
authentication, does not properly flush the OpenSSL error queue when a
client fails certificate authentication to the server and causes the
error to be processed by the wrong client, which allows remote
attackers to cause a denial of service (client disconnection) via a
large number of failed authentication attempts.
|
| CVE-2005-1730 |
Multiple vulnerabilities in the OpenSSL ASN.1 parser, as used in
Novell iManager 2.0.2, allows remote attackers to cause a denial of
service (NULL pointer dereference) via crafted packets, as
demonstrated by "OpenSSL ASN.1 brute forcer." NOTE: this issue might
overlap CVE-2004-0079, CVE-2004-0081, or CVE-2004-0112.
|
| CVE-2005-1247 |
webadmin.exe in Novell Nsure Audit 1.0.1 allows remote attackers to
cause a denial of service via malformed ASN.1 packets in corrupt
client certificates to an SSL server, as demonstrated using an exploit
for the OpenSSL ASN.1 parsing vulnerability.
|
| CVE-2004-2662 |
Soft3304 04WebServer before 1.41 allows remote attackers to cause a
denial of service (resource consumption or crash) via certain data
related to OpenSSL, which causes a thread to terminate but continue to
hold resources.
|
| CVE-2004-0975 |
The der_chop script in the openssl package in Trustix Secure Linux 1.5
through 2.1 and other operating systems allows local users
to overwrite files via a symlink attack on temporary files.
|
| CVE-2004-0607 |
The eay_check_x509cert function in KAME Racoon successfully verifies
certificates even when OpenSSL validation fails, which could allow
remote attackers to bypass authentication.
|
| CVE-2004-0112 |
The SSL/TLS handshaking code in OpenSSL 0.9.7a, 0.9.7b, and 0.9.7c,
when using Kerberos ciphersuites, does not properly check the length
of Kerberos tickets during a handshake, which allows remote attackers
to cause a denial of service (crash) via a crafted SSL/TLS handshake
that causes an out-of-bounds read.
|
| CVE-2004-0081 |
OpenSSL 0.9.6 before 0.9.6d does not properly handle unknown message
types, which allows remote attackers to cause a denial of service
(infinite loop), as demonstrated using the Codenomicon TLS Test Tool.
|
| CVE-2004-0079 |
The do_change_cipher_spec function in OpenSSL 0.9.6c to 0.9.6k, and
0.9.7a to 0.9.7c, allows remote attackers to cause a denial of service
(crash) via a crafted SSL/TLS handshake that triggers a null
dereference.
|
| CVE-2003-0851 |
OpenSSL 0.9.6k allows remote attackers to cause a denial of service
(crash via large recursion) via malformed ASN.1 sequences.
|
| CVE-2003-0545 |
Double free vulnerability in OpenSSL 0.9.7 allows remote attackers to
cause a denial of service (crash) and possibly execute arbitrary code
via an SSL client certificate with a certain invalid ASN.1 encoding.
|
| CVE-2003-0544 |
OpenSSL 0.9.6 and 0.9.7 does not properly track the number of
characters in certain ASN.1 inputs, which allows remote attackers to
cause a denial of service (crash) via an SSL client certificate that
causes OpenSSL to read past the end of a buffer when the long form is
used.
|
| CVE-2003-0543 |
Integer overflow in OpenSSL 0.9.6 and 0.9.7 allows remote attackers to
cause a denial of service (crash) via an SSL client certificate with
certain ASN.1 tag values.
|
| CVE-2003-0161 |
The prescan() function in the address parser (parseaddr.c) in Sendmail
before 8.12.9 does not properly handle certain conversions from char
and int types, which can cause a length check to be disabled when
Sendmail misinterprets an input value as a special "NOCHAR" control
value, allowing attackers to cause a denial of service and possibly
execute arbitrary code via a buffer overflow attack using messages, a
different vulnerability than CVE-2002-1337.
|
| CVE-2003-0147 |
OpenSSL does not use RSA blinding by default, which allows local and
remote attackers to obtain the server's private key by determining
factors using timing differences on (1) the number of extra reductions
during Montgomery reduction, and (2) the use of different integer
multiplication algorithms ("Karatsuba" and normal).
|
| CVE-2003-0131 |
The SSL and TLS components for OpenSSL 0.9.6i and earlier, 0.9.7, and
0.9.7a allow remote attackers to perform an unauthorized RSA private
key operation via a modified Bleichenbacher attack that uses a large
number of SSL or TLS connections using PKCS #1 v1.5 padding that cause
OpenSSL to leak information regarding the relationship between
ciphertext and the associated plaintext, aka the "Klima-Pokorny-Rosa
attack."
|
| CVE-2003-0086 |
The code for writing reg files in Samba before 2.2.8 allows local
users to overwrite arbitrary files via a race condition involving
chown.
|
| CVE-2003-0085 |
Buffer overflow in the SMB/CIFS packet fragment re-assembly code for
SMB daemon (smbd) in Samba before 2.2.8, and Samba-TNG before 0.3.1,
allows remote attackers to execute arbitrary code.
|
| CVE-2003-0078 |
ssl3_get_record in s3_pkt.c for OpenSSL before 0.9.7a and 0.9.6 before
0.9.6i does not perform a MAC computation if an incorrect block cipher
padding is used, which causes an information leak (timing discrepancy)
that may make it easier to launch cryptographic attacks that rely on
distinguishing between padding and MAC verification errors, possibly
leading to extraction of the original plaintext, aka the "Vaudenay
timing attack."
|
| CVE-2002-1568 |
OpenSSL 0.9.6e uses assertions when detecting buffer overflow attacks
instead of less severe mechanisms, which allows remote attackers to
cause a denial of service (crash) via certain messages that cause
OpenSSL to abort from a failed assertion, as demonstrated using SSLv2
CLIENT_MASTER_KEY messages, which are not properly handled in
s2_srvr.c.
|
| CVE-2002-0659 |
The ASN1 library in OpenSSL 0.9.6d and earlier, and 0.9.7-beta2 and
earlier, allows remote attackers to cause a denial of service via
invalid encodings.
|
| CVE-2002-0657 |
Buffer overflow in OpenSSL 0.9.7 before 0.9.7-beta3, with Kerberos
enabled, allows attackers to execute arbitrary code via a long master
key.
|
| CVE-2002-0656 |
Buffer overflows in OpenSSL 0.9.6d and earlier, and 0.9.7-beta2 and
earlier, allow remote attackers to execute arbitrary code via (1) a
large client master key in SSL2 or (2) a large session ID in SSL3.
|
| CVE-2002-0655 |
OpenSSL 0.9.6d and earlier, and 0.9.7-beta2 and earlier, does not
properly handle ASCII representations of integers on 64 bit platforms,
which could allow attackers to cause a denial of service and possibly
execute arbitrary code.
|
| CVE-2001-1141 |
The Pseudo-Random Number Generator (PRNG) in SSLeay and OpenSSL before
0.9.6b allows attackers to use the output of small PRNG requests to
determine the internal state information, which could be used by
attackers to predict future pseudo-random numbers.
|
| CVE-2000-1254 |
crypto/rsa/rsa_gen.c in OpenSSL before 0.9.6 mishandles C
bitwise-shift operations that exceed the size of an expression, which
makes it easier for remote attackers to defeat cryptographic
protection mechanisms by leveraging improper RSA key generation on
64-bit HP-UX platforms.
|
| CVE-2000-0535 |
OpenSSL 0.9.4 and OpenSSH for FreeBSD do not properly check for the
existence of the /dev/random or /dev/urandom devices, which are absent
on FreeBSD Alpha systems, which causes them to produce weak keys which
may be more easily broken.
|
| CVE-1999-0428 |
OpenSSL and SSLeay allow remote attackers to reuse SSL sessions and
bypass access controls.
|