Show filters
267 Total Results
Displaying 101-110 of 267
Sort by:
Attacker Value
Unknown

CVE-2016-6305

Disclosure Date: September 26, 2016 (last updated November 08, 2023)
The ssl3_read_bytes function in record/rec_layer_s3.c in OpenSSL 1.1.0 before 1.1.0a allows remote attackers to cause a denial of service (infinite loop) by triggering a zero-length record in an SSL_peek call.
0
Attacker Value
Unknown

CVE-2016-6309

Disclosure Date: September 26, 2016 (last updated November 08, 2023)
statem/statem.c in OpenSSL 1.1.0a does not consider memory-block movement after a realloc call, which allows remote attackers to cause a denial of service (use-after-free) or possibly execute arbitrary code via a crafted TLS session.
0
Attacker Value
Unknown

CVE-2016-6307

Disclosure Date: September 26, 2016 (last updated November 08, 2023)
The state-machine implementation in OpenSSL 1.1.0 before 1.1.0a allocates memory before checking for an excessive length, which might allow remote attackers to cause a denial of service (memory consumption) via crafted TLS messages, related to statem/statem.c and statem/statem_lib.c.
0
Attacker Value
Unknown

CVE-2016-6303

Disclosure Date: September 16, 2016 (last updated November 25, 2024)
Integer overflow in the MDC2_Update function in crypto/mdc2/mdc2dgst.c in OpenSSL before 1.1.0 allows remote attackers to cause a denial of service (out-of-bounds write and application crash) or possibly have unspecified other impact via unknown vectors.
Attacker Value
Unknown

CVE-2016-2182

Disclosure Date: September 16, 2016 (last updated November 08, 2023)
The BN_bn2dec function in crypto/bn/bn_print.c in OpenSSL before 1.1.0 does not properly validate division results, which allows remote attackers to cause a denial of service (out-of-bounds write and application crash) or possibly have unspecified other impact via unknown vectors.
0
Attacker Value
Unknown

CVE-2016-6302

Disclosure Date: September 16, 2016 (last updated November 08, 2023)
The tls_decrypt_ticket function in ssl/t1_lib.c in OpenSSL before 1.1.0 does not consider the HMAC size during validation of the ticket length, which allows remote attackers to cause a denial of service via a ticket that is too short.
0
Attacker Value
Unknown

CVE-2016-2179

Disclosure Date: September 16, 2016 (last updated November 08, 2023)
The DTLS implementation in OpenSSL before 1.1.0 does not properly restrict the lifetime of queue entries associated with unused out-of-order messages, which allows remote attackers to cause a denial of service (memory consumption) by maintaining many crafted DTLS sessions simultaneously, related to d1_lib.c, statem_dtls.c, statem_lib.c, and statem_srvr.c.
0
Attacker Value
Unknown

CVE-2016-2181

Disclosure Date: September 16, 2016 (last updated November 08, 2023)
The Anti-Replay feature in the DTLS implementation in OpenSSL before 1.1.0 mishandles early use of a new epoch number in conjunction with a large sequence number, which allows remote attackers to cause a denial of service (false-positive packet drops) via spoofed DTLS records, related to rec_layer_d1.c and ssl3_record.c.
0
Attacker Value
Unknown

CVE-2016-2180

Disclosure Date: August 01, 2016 (last updated November 25, 2024)
The TS_OBJ_print_bio function in crypto/ts/ts_lib.c in the X.509 Public Key Infrastructure Time-Stamp Protocol (TSP) implementation in OpenSSL through 1.0.2h allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted time-stamp file that is mishandled by the "openssl ts" command.
0
Attacker Value
Unknown

CVE-2016-2177

Disclosure Date: June 20, 2016 (last updated November 08, 2023)
OpenSSL through 1.0.2h incorrectly uses pointer arithmetic for heap-buffer boundary checks, which might allow remote attackers to cause a denial of service (integer overflow and application crash) or possibly have unspecified other impact by leveraging unexpected malloc behavior, related to s3_srvr.c, ssl_sess.c, and t1_lib.c.
0