Show filters
267 Total Results
Displaying 201-210 of 267
Sort by:
Attacker Value
Unknown

CVE-2011-4576

Disclosure Date: January 06, 2012 (last updated October 04, 2023)
The SSL 3.0 implementation in OpenSSL before 0.9.8s and 1.x before 1.0.0f does not properly initialize data structures for block cipher padding, which might allow remote attackers to obtain sensitive information by decrypting the padding data sent by an SSL peer.
0
Attacker Value
Unknown

CVE-2011-4109

Disclosure Date: January 06, 2012 (last updated October 04, 2023)
Double free vulnerability in OpenSSL 0.9.8 before 0.9.8s, when X509_V_FLAG_POLICY_CHECK is enabled, allows remote attackers to have an unspecified impact by triggering failure of a policy check.
0
Attacker Value
Unknown

CVE-2012-0027

Disclosure Date: January 06, 2012 (last updated October 04, 2023)
The GOST ENGINE in OpenSSL before 1.0.0f does not properly handle invalid parameters for the GOST block cipher, which allows remote attackers to cause a denial of service (daemon crash) via crafted data from a TLS client.
0
Attacker Value
Unknown

CVE-2011-4577

Disclosure Date: January 06, 2012 (last updated October 04, 2023)
OpenSSL before 0.9.8s and 1.x before 1.0.0f, when RFC 3779 support is enabled, allows remote attackers to cause a denial of service (assertion failure) via an X.509 certificate containing certificate-extension data associated with (1) IP address blocks or (2) Autonomous System (AS) identifiers.
0
Attacker Value
Unknown

CVE-2011-3210

Disclosure Date: September 22, 2011 (last updated October 04, 2023)
The ephemeral ECDH ciphersuite functionality in OpenSSL 0.9.8 through 0.9.8r and 1.0.x before 1.0.0e does not ensure thread safety during processing of handshake messages from clients, which allows remote attackers to cause a denial of service (daemon crash) via out-of-order messages that violate the TLS protocol.
0
Attacker Value
Unknown

CVE-2011-3207

Disclosure Date: September 22, 2011 (last updated October 04, 2023)
crypto/x509/x509_vfy.c in OpenSSL 1.0.x before 1.0.0e does not initialize certain structure members, which makes it easier for remote attackers to bypass CRL validation by using a nextUpdate value corresponding to a time in the past.
0
Attacker Value
Unknown

CVE-2011-1945

Disclosure Date: May 31, 2011 (last updated October 04, 2023)
The elliptic curve cryptography (ECC) subsystem in OpenSSL 1.0.0d and earlier, when the Elliptic Curve Digital Signature Algorithm (ECDSA) is used for the ECDHE_ECDSA cipher suite, does not properly implement curves over binary fields, which makes it easier for context-dependent attackers to determine private keys via a timing attack and a lattice calculation.
0
Attacker Value
Unknown

CVE-2011-0014

Disclosure Date: February 19, 2011 (last updated October 04, 2023)
ssl/t1_lib.c in OpenSSL 0.9.8h through 0.9.8q and 1.0.0 through 1.0.0c allows remote attackers to cause a denial of service (crash), and possibly obtain sensitive information in applications that use OpenSSL, via a malformed ClientHello handshake message that triggers an out-of-bounds memory access, aka "OCSP stapling vulnerability."
0
Attacker Value
Unknown

CVE-2008-7270

Disclosure Date: December 06, 2010 (last updated October 04, 2023)
OpenSSL before 0.9.8j, when SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG is enabled, does not prevent modification of the ciphersuite in the session cache, which allows remote attackers to force the use of a disabled cipher via vectors involving sniffing network traffic to discover a session identifier, a different vulnerability than CVE-2010-4180.
0
Attacker Value
Unknown

CVE-2010-4180

Disclosure Date: December 06, 2010 (last updated October 04, 2023)
OpenSSL before 0.9.8q, and 1.0.x before 1.0.0c, when SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG is enabled, does not properly prevent modification of the ciphersuite in the session cache, which allows remote attackers to force the downgrade to an unintended cipher via vectors involving sniffing network traffic to discover a session identifier.
0