There are 89 matching records.
Displaying matches 1 through 20.
Search Parameters:
- Contains Software Flaws (CVE)
- CPE Vendor: cpe:/:openssl
- Publication End Date: March 2014
-
CVE-2014-0076
-
Summary: The Montgomery ladder implementation in OpenSSL through 1.0.0l does not ensure that certain swap operations have a constant-time behavior, which makes it easier for local users to obtain ECDSA nonces via a FLUSH+RELOAD cache side-channel attack.
Published: 3/25/2014 9:25:21 AM
CVSS Severity: 4.3 MEDIUM
-
CVE-2013-4353
-
Summary: The ssl3_take_mac function in ssl/s3_both.c in OpenSSL 1.0.1 before 1.0.1f allows remote TLS servers to cause a denial of service (NULL pointer dereference and application crash) via a crafted Next Protocol Negotiation record in a TLS handshake.
Published: 1/8/2014 8:55:03 PM
CVSS Severity: 4.3 MEDIUM
-
CVE-2013-6450
-
Summary: The DTLS retransmission implementation in OpenSSL 1.0.0 before 1.0.0l and 1.0.1 before 1.0.1f does not properly maintain data structures for digest and encryption contexts, which might allow man-in-the-middle attackers to trigger the use of a different context and cause a denial of service (application crash) by interfering with packet delivery, related to ssl/d1_both.c and ssl/t1_enc.c.
Published: 1/1/2014 11:05:15 AM
CVSS Severity: 5.8 MEDIUM
-
CVE-2013-6449
-
Summary: The ssl_get_algorithm2 function in ssl/s3_lib.c in OpenSSL before 1.0.2 obtains a certain version number from an incorrect data structure, which allows remote attackers to cause a denial of service (daemon crash) via crafted traffic from a TLS 1.2 client.
Published: 12/23/2013 5:55:03 PM
CVSS Severity: 4.3 MEDIUM
-
CVE-2013-0169
-
Summary: The TLS protocol 1.1 and 1.2 and the DTLS protocol 1.0 and 1.2, as used in OpenSSL, OpenJDK, PolarSSL, and other products, do not properly consider timing side-channel attacks on a MAC check requirement during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, aka the "Lucky Thirteen" issue.
Published: 2/8/2013 2:55:01 PM
-
CVE-2013-0166
-
Summary: OpenSSL before 0.9.8y, 1.0.0 before 1.0.0k, and 1.0.1 before 1.0.1d does not properly perform signature verification for OCSP responses, which allows remote OCSP servers to cause a denial of service (NULL pointer dereference and application crash) via an invalid key.
Published: 2/8/2013 2:55:00 PM
CVSS Severity: 5.0 MEDIUM
-
CVE-2012-2686
-
Summary: crypto/evp/e_aes_cbc_hmac_sha1.c in the AES-NI functionality in the TLS 1.1 and 1.2 implementations in OpenSSL 1.0.1 before 1.0.1d allows remote attackers to cause a denial of service (application crash) via crafted CBC data.
Published: 2/8/2013 2:55:00 PM
CVSS Severity: 5.0 MEDIUM
-
CVE-2011-5095
-
Summary: The Diffie-Hellman key-exchange implementation in OpenSSL 0.9.8, when FIPS mode is enabled, does not properly validate a public parameter, which makes it easier for man-in-the-middle attackers to obtain the shared secret key by modifying network traffic, a related issue to CVE-2011-1923.
Published: 6/20/2012 1:55:01 PM
CVSS Severity: 4.0 MEDIUM
-
CVE-2011-1473
-
Summary: ** DISPUTED ** OpenSSL before 0.9.8l, and 0.9.8m through 1.x, does not properly restrict client-initiated renegotiation within the SSL and TLS protocols, which might make it easier for remote attackers to cause a denial of service (CPU consumption) by performing many renegotiations within a single connection, a different vulnerability than CVE-2011-5094. NOTE: it can also be argued that it is the responsibility of server deployments, not a security library, to prevent or limit renegotiation when it is inappropriate within a specific environment.
Published: 6/16/2012 5:55:02 PM
CVSS Severity: 5.0 MEDIUM
-
CVE-2012-2333
-
Summary: Integer underflow in OpenSSL before 0.9.8x, 1.0.0 before 1.0.0j, and 1.0.1 before 1.0.1c, when TLS 1.1, TLS 1.2, or DTLS is used with CBC encryption, allows remote attackers to cause a denial of service (buffer over-read) or possibly have unspecified other impact via a crafted TLS packet that is not properly handled during a certain explicit IV calculation.
Published: 5/14/2012 6:55:03 PM
CVSS Severity: 6.8 MEDIUM
-
CVE-2012-2131
-
Summary: Multiple integer signedness errors in crypto/buffer/buffer.c in OpenSSL 0.9.8v allow remote attackers to conduct buffer overflow attacks, and cause a denial of service (memory corruption) or possibly have unspecified other impact, via crafted DER data, as demonstrated by an X.509 certificate or an RSA public key. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-2110.
Published: 4/24/2012 4:55:02 PM
-
CVE-2012-2110
-
Summary: The asn1_d2i_read_bio function in crypto/asn1/a_d2i_fp.c in OpenSSL before 0.9.8v, 1.0.0 before 1.0.0i, and 1.0.1 before 1.0.1a does not properly interpret integer data, which allows remote attackers to conduct buffer overflow attacks, and cause a denial of service (memory corruption) or possibly have unspecified other impact, via crafted DER data, as demonstrated by an X.509 certificate or an RSA public key.
Published: 4/19/2012 1:55:01 PM
-
CVE-2012-1165
-
Summary: The mime_param_cmp function in crypto/asn1/asn_mime.c in OpenSSL before 0.9.8u and 1.x before 1.0.0h allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted S/MIME message, a different vulnerability than CVE-2006-7250.
Published: 3/15/2012 1:55:00 PM
CVSS Severity: 5.0 MEDIUM
-
CVE-2012-0884
-
Summary: The implementation of Cryptographic Message Syntax (CMS) and PKCS #7 in OpenSSL before 0.9.8u and 1.x before 1.0.0h does not properly restrict certain oracle behavior, which makes it easier for context-dependent attackers to decrypt data via a Million Message Attack (MMA) adaptive chosen ciphertext attack.
Published: 3/12/2012 11:12:26 PM
CVSS Severity: 5.0 MEDIUM
-
CVE-2006-7250
-
Summary: The mime_hdr_cmp function in crypto/asn1/asn_mime.c in OpenSSL 0.9.8t and earlier allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted S/MIME message.
Published: 2/29/2012 6:55:04 AM
CVSS Severity: 5.0 MEDIUM
-
CVE-2011-4354
-
Summary: crypto/bn/bn_nist.c in OpenSSL before 0.9.8h on 32-bit platforms, as used in stunnel and other products, in certain circumstances involving ECDH or ECDHE cipher suites, uses an incorrect modular reduction algorithm in its implementation of the P-256 and P-384 NIST elliptic curves, which allows remote attackers to obtain the private key of a TLS server via multiple handshake attempts.
Published: 1/26/2012 7:55:01 PM
CVSS Severity: 5.8 MEDIUM
-
CVE-2012-0050
-
Summary: OpenSSL 0.9.8s and 1.0.0f does not properly support DTLS applications, which allows remote attackers to cause a denial of service (crash) via unspecified vectors related to an out-of-bounds read. NOTE: this vulnerability exists because of an incorrect fix for CVE-2011-4108.
Published: 1/19/2012 2:55:01 PM
CVSS Severity: 5.0 MEDIUM
-
CVE-2012-0027
-
Summary: The GOST ENGINE in OpenSSL before 1.0.0f does not properly handle invalid parameters for the GOST block cipher, which allows remote attackers to cause a denial of service (daemon crash) via crafted data from a TLS client.
Published: 1/5/2012 8:55:01 PM
CVSS Severity: 5.0 MEDIUM
-
CVE-2011-4619
-
Summary: The Server Gated Cryptography (SGC) implementation in OpenSSL before 0.9.8s and 1.x before 1.0.0f does not properly handle handshake restarts, which allows remote attackers to cause a denial of service (CPU consumption) via unspecified vectors.
Published: 1/5/2012 8:55:01 PM
CVSS Severity: 5.0 MEDIUM
-
CVE-2011-4577
-
Summary: OpenSSL before 0.9.8s and 1.x before 1.0.0f, when RFC 3779 support is enabled, allows remote attackers to cause a denial of service (assertion failure) via an X.509 certificate containing certificate-extension data associated with (1) IP address blocks or (2) Autonomous System (AS) identifiers.
Published: 1/5/2012 8:55:00 PM
CVSS Severity: 4.3 MEDIUM