Show filters
12 Total Results
Displaying 1-10 of 12
Sort by:
Attacker Value
Unknown

CVE-2023-35784

Disclosure Date: June 16, 2023 (last updated October 08, 2023)
A double free or use after free could occur after SSL_clear in OpenBSD 7.2 before errata 026 and 7.3 before errata 004, and in LibreSSL before 3.6.3 and 3.7.x before 3.7.3. NOTE: OpenSSL is not affected.
Attacker Value
Unknown

CVE-2021-46880

Disclosure Date: April 15, 2023 (last updated October 08, 2023)
x509/x509_verify.c in LibreSSL before 3.4.2, and OpenBSD before 7.0 errata 006, allows authentication bypass because an error for an unverified certificate chain is sometimes discarded.
Attacker Value
Unknown

CVE-2022-48437

Disclosure Date: April 12, 2023 (last updated October 08, 2023)
An issue was discovered in x509/x509_verify.c in LibreSSL before 3.6.1, and in OpenBSD before 7.2 errata 001. x509_verify_ctx_add_chain does not store errors that occur during leaf certificate verification, and therefore an incorrect error is returned. This behavior occurs when there is an installed verification callback that instructs the verifier to continue upon detecting an invalid certificate.
Attacker Value
Unknown

CVE-2021-41581

Disclosure Date: September 24, 2021 (last updated November 28, 2024)
x509_constraints_parse_mailbox in lib/libcrypto/x509/x509_constraints.c in LibreSSL through 3.4.0 has a stack-based buffer over-read. When the input exceeds DOMAIN_PART_MAX_LEN, the buffer lacks '\0' termination.
Attacker Value
Unknown

CVE-2019-25048

Disclosure Date: July 01, 2021 (last updated November 28, 2024)
LibreSSL 2.9.1 through 3.2.1 has a heap-based buffer over-read in do_print_ex (called from asn1_item_print_ctx and ASN1_item_print).
Attacker Value
Unknown

CVE-2019-25049

Disclosure Date: July 01, 2021 (last updated November 28, 2024)
LibreSSL 2.9.1 through 3.2.1 has an out-of-bounds read in asn1_item_print_ctx (called from asn1_template_print_ctx).
Attacker Value
Unknown

CVE-2015-5333

Disclosure Date: January 23, 2020 (last updated February 21, 2025)
Memory leak in the OBJ_obj2txt function in LibreSSL before 2.3.1 allows remote attackers to cause a denial of service (memory consumption) via a large number of ASN.1 object identifiers in X.509 certificates.
Attacker Value
Unknown

CVE-2015-5334

Disclosure Date: January 23, 2020 (last updated February 21, 2025)
Off-by-one error in the OBJ_obj2txt function in LibreSSL before 2.3.1 allows remote attackers to cause a denial of service (program crash) or possible execute arbitrary code via a crafted X.509 certificate, which triggers a stack-based buffer overflow. Note: this vulnerability exists because of an incorrect fix for CVE-2014-3508.
Attacker Value
Unknown

CVE-2018-12434

Disclosure Date: June 15, 2018 (last updated November 26, 2024)
LibreSSL before 2.6.5 and 2.7.x before 2.7.4 allows a memory-cache side-channel attack on DSA and ECDSA signatures, aka the Return Of the Hidden Number Problem or ROHNP. To discover a key, the attacker needs access to either the local machine or a different virtual machine on the same physical host.
0
Attacker Value
Unknown

CVE-2018-8970

Disclosure Date: March 24, 2018 (last updated November 26, 2024)
The int_x509_param_set_hosts function in lib/libcrypto/x509/x509_vpm.c in LibreSSL 2.7.0 before 2.7.1 does not support a certain special case of a zero name length, which causes silent omission of hostname verification, and consequently allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. NOTE: the LibreSSL documentation indicates that this special case is supported, but the BoringSSL documentation does not.
0