Show filters
34 Total Results
Displaying 11-20 of 34
Sort by:
Attacker Value
Unknown

CVE-2012-2333

Disclosure Date: May 14, 2012 (last updated October 04, 2023)
Integer underflow in OpenSSL before 0.9.8x, 1.0.0 before 1.0.0j, and 1.0.1 before 1.0.1c, when TLS 1.1, TLS 1.2, or DTLS is used with CBC encryption, allows remote attackers to cause a denial of service (buffer over-read) or possibly have unspecified other impact via a crafted TLS packet that is not properly handled during a certain explicit IV calculation.
0
Attacker Value
Unknown

CVE-2012-2110

Disclosure Date: April 19, 2012 (last updated October 04, 2023)
The asn1_d2i_read_bio function in crypto/asn1/a_d2i_fp.c in OpenSSL before 0.9.8v, 1.0.0 before 1.0.0i, and 1.0.1 before 1.0.1a does not properly interpret integer data, which allows remote attackers to conduct buffer overflow attacks, and cause a denial of service (memory corruption) or possibly have unspecified other impact, via crafted DER data, as demonstrated by an X.509 certificate or an RSA public key.
0
Attacker Value
Unknown

CVE-2012-1165

Disclosure Date: March 15, 2012 (last updated October 04, 2023)
The mime_param_cmp function in crypto/asn1/asn_mime.c in OpenSSL before 0.9.8u and 1.x before 1.0.0h allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted S/MIME message, a different vulnerability than CVE-2006-7250.
0
Attacker Value
Unknown

CVE-2012-0884

Disclosure Date: March 13, 2012 (last updated October 04, 2023)
The implementation of Cryptographic Message Syntax (CMS) and PKCS #7 in OpenSSL before 0.9.8u and 1.x before 1.0.0h does not properly restrict certain oracle behavior, which makes it easier for context-dependent attackers to decrypt data via a Million Message Attack (MMA) adaptive chosen ciphertext attack.
0
Attacker Value
Unknown

CVE-2006-7250

Disclosure Date: February 29, 2012 (last updated October 04, 2023)
The mime_hdr_cmp function in crypto/asn1/asn_mime.c in OpenSSL 0.9.8t and earlier allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted S/MIME message.
0
Attacker Value
Unknown

CVE-2011-4619

Disclosure Date: January 06, 2012 (last updated October 04, 2023)
The Server Gated Cryptography (SGC) implementation in OpenSSL before 0.9.8s and 1.x before 1.0.0f does not properly handle handshake restarts, which allows remote attackers to cause a denial of service (CPU consumption) via unspecified vectors.
0
Attacker Value
Unknown

CVE-2011-4108

Disclosure Date: January 06, 2012 (last updated October 04, 2023)
The DTLS implementation in OpenSSL before 0.9.8s and 1.x before 1.0.0f performs a MAC check only if certain padding is valid, which makes it easier for remote attackers to recover plaintext via a padding oracle attack.
0
Attacker Value
Unknown

CVE-2011-4576

Disclosure Date: January 06, 2012 (last updated October 04, 2023)
The SSL 3.0 implementation in OpenSSL before 0.9.8s and 1.x before 1.0.0f does not properly initialize data structures for block cipher padding, which might allow remote attackers to obtain sensitive information by decrypting the padding data sent by an SSL peer.
0
Attacker Value
Unknown

CVE-2011-4109

Disclosure Date: January 06, 2012 (last updated October 04, 2023)
Double free vulnerability in OpenSSL 0.9.8 before 0.9.8s, when X509_V_FLAG_POLICY_CHECK is enabled, allows remote attackers to have an unspecified impact by triggering failure of a policy check.
0
Attacker Value
Unknown

CVE-2012-0027

Disclosure Date: January 06, 2012 (last updated October 04, 2023)
The GOST ENGINE in OpenSSL before 1.0.0f does not properly handle invalid parameters for the GOST block cipher, which allows remote attackers to cause a denial of service (daemon crash) via crafted data from a TLS client.
0