Show filters
267 Total Results
Displaying 181-190 of 267
Sort by:
Attacker Value
Unknown
CVE-2010-5298
Disclosure Date: April 14, 2014 (last updated October 05, 2023)
Race condition in the ssl3_read_bytes function in s3_pkt.c in OpenSSL through 1.0.1g, when SSL_MODE_RELEASE_BUFFERS is enabled, allows remote attackers to inject data across sessions or cause a denial of service (use-after-free and parsing error) via an SSL connection in a multithreaded environment.
0
Attacker Value
Unknown
CVE-2014-0076
Disclosure Date: March 25, 2014 (last updated October 05, 2023)
The Montgomery ladder implementation in OpenSSL through 1.0.0l does not ensure that certain swap operations have a constant-time behavior, which makes it easier for local users to obtain ECDSA nonces via a FLUSH+RELOAD cache side-channel attack.
0
Attacker Value
Unknown
CVE-2013-4353
Disclosure Date: January 09, 2014 (last updated October 05, 2023)
The ssl3_take_mac function in ssl/s3_both.c in OpenSSL 1.0.1 before 1.0.1f allows remote TLS servers to cause a denial of service (NULL pointer dereference and application crash) via a crafted Next Protocol Negotiation record in a TLS handshake.
0
Attacker Value
Unknown
CVE-2013-6450
Disclosure Date: January 01, 2014 (last updated October 05, 2023)
The DTLS retransmission implementation in OpenSSL 1.0.0 before 1.0.0l and 1.0.1 before 1.0.1f does not properly maintain data structures for digest and encryption contexts, which might allow man-in-the-middle attackers to trigger the use of a different context and cause a denial of service (application crash) by interfering with packet delivery, related to ssl/d1_both.c and ssl/t1_enc.c.
0
Attacker Value
Unknown
CVE-2013-6449
Disclosure Date: December 23, 2013 (last updated October 05, 2023)
The ssl_get_algorithm2 function in ssl/s3_lib.c in OpenSSL before 1.0.2 obtains a certain version number from an incorrect data structure, which allows remote attackers to cause a denial of service (daemon crash) via crafted traffic from a TLS 1.2 client.
0
Attacker Value
Unknown
CVE-2013-0169
Disclosure Date: February 08, 2013 (last updated October 05, 2023)
The TLS protocol 1.1 and 1.2 and the DTLS protocol 1.0 and 1.2, as used in OpenSSL, OpenJDK, PolarSSL, and other products, do not properly consider timing side-channel attacks on a MAC check requirement during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, aka the "Lucky Thirteen" issue.
0
Attacker Value
Unknown
CVE-2013-0166
Disclosure Date: February 08, 2013 (last updated October 05, 2023)
OpenSSL before 0.9.8y, 1.0.0 before 1.0.0k, and 1.0.1 before 1.0.1d does not properly perform signature verification for OCSP responses, which allows remote OCSP servers to cause a denial of service (NULL pointer dereference and application crash) via an invalid key.
0
Attacker Value
Unknown
CVE-2012-2686
Disclosure Date: February 08, 2013 (last updated October 05, 2023)
crypto/evp/e_aes_cbc_hmac_sha1.c in the AES-NI functionality in the TLS 1.1 and 1.2 implementations in OpenSSL 1.0.1 before 1.0.1d allows remote attackers to cause a denial of service (application crash) via crafted CBC data.
0
Attacker Value
Unknown
CVE-2011-5095
Disclosure Date: June 20, 2012 (last updated October 04, 2023)
The Diffie-Hellman key-exchange implementation in OpenSSL 0.9.8, when FIPS mode is enabled, does not properly validate a public parameter, which makes it easier for man-in-the-middle attackers to obtain the shared secret key by modifying network traffic, a related issue to CVE-2011-1923.
0
Attacker Value
Unknown
CVE-2011-1473
Disclosure Date: June 16, 2012 (last updated November 08, 2023)
OpenSSL before 0.9.8l, and 0.9.8m through 1.x, does not properly restrict client-initiated renegotiation within the SSL and TLS protocols, which might make it easier for remote attackers to cause a denial of service (CPU consumption) by performing many renegotiations within a single connection, a different vulnerability than CVE-2011-5094. NOTE: it can also be argued that it is the responsibility of server deployments, not a security library, to prevent or limit renegotiation when it is inappropriate within a specific environment
0