Vulnerabilities > Openssl > Openssl > 0.9.7e

DATE CVE VULNERABILITY TITLE RISK
2012-04-19 CVE-2012-2110 Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in multiple products
The asn1_d2i_read_bio function in crypto/asn1/a_d2i_fp.c in OpenSSL before 0.9.8v, 1.0.0 before 1.0.0i, and 1.0.1 before 1.0.1a does not properly interpret integer data, which allows remote attackers to conduct buffer overflow attacks, and cause a denial of service (memory corruption) or possibly have unspecified other impact, via crafted DER data, as demonstrated by an X.509 certificate or an RSA public key.
network
low complexity
openssl redhat CWE-119
7.5
2012-03-15 CVE-2012-1165 Resource Management Errors vulnerability in Openssl
The mime_param_cmp function in crypto/asn1/asn_mime.c in OpenSSL before 0.9.8u and 1.x before 1.0.0h allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted S/MIME message, a different vulnerability than CVE-2006-7250.
network
low complexity
openssl CWE-399
5.0
2012-03-13 CVE-2012-0884 Cryptographic Issues vulnerability in Openssl
The implementation of Cryptographic Message Syntax (CMS) and PKCS #7 in OpenSSL before 0.9.8u and 1.x before 1.0.0h does not properly restrict certain oracle behavior, which makes it easier for context-dependent attackers to decrypt data via a Million Message Attack (MMA) adaptive chosen ciphertext attack.
network
low complexity
openssl CWE-310
5.0
2012-01-27 CVE-2011-4354 Cryptographic Issues vulnerability in Openssl
crypto/bn/bn_nist.c in OpenSSL before 0.9.8h on 32-bit platforms, as used in stunnel and other products, in certain circumstances involving ECDH or ECDHE cipher suites, uses an incorrect modular reduction algorithm in its implementation of the P-256 and P-384 NIST elliptic curves, which allows remote attackers to obtain the private key of a TLS server via multiple handshake attempts.
network
openssl CWE-310
5.8
2012-01-06 CVE-2012-0027 Resource Management Errors vulnerability in Openssl
The GOST ENGINE in OpenSSL before 1.0.0f does not properly handle invalid parameters for the GOST block cipher, which allows remote attackers to cause a denial of service (daemon crash) via crafted data from a TLS client.
network
low complexity
openssl CWE-399
5.0
2012-01-06 CVE-2011-4619 Resource Management Errors vulnerability in Openssl
The Server Gated Cryptography (SGC) implementation in OpenSSL before 0.9.8s and 1.x before 1.0.0f does not properly handle handshake restarts, which allows remote attackers to cause a denial of service (CPU consumption) via unspecified vectors.
network
low complexity
openssl CWE-399
5.0
2012-01-06 CVE-2011-4577 Resource Management Errors vulnerability in Openssl
OpenSSL before 0.9.8s and 1.x before 1.0.0f, when RFC 3779 support is enabled, allows remote attackers to cause a denial of service (assertion failure) via an X.509 certificate containing certificate-extension data associated with (1) IP address blocks or (2) Autonomous System (AS) identifiers.
network
openssl CWE-399
4.3
2012-01-06 CVE-2011-4576 Cryptographic Issues vulnerability in Openssl
The SSL 3.0 implementation in OpenSSL before 0.9.8s and 1.x before 1.0.0f does not properly initialize data structures for block cipher padding, which might allow remote attackers to obtain sensitive information by decrypting the padding data sent by an SSL peer.
network
low complexity
openssl CWE-310
5.0
2012-01-06 CVE-2011-4108 Cryptographic Issues vulnerability in Openssl
The DTLS implementation in OpenSSL before 0.9.8s and 1.x before 1.0.0f performs a MAC check only if certain padding is valid, which makes it easier for remote attackers to recover plaintext via a padding oracle attack.
network
openssl CWE-310
4.3
2011-05-31 CVE-2011-1945 Cryptographic Issues vulnerability in Openssl
The elliptic curve cryptography (ECC) subsystem in OpenSSL 1.0.0d and earlier, when the Elliptic Curve Digital Signature Algorithm (ECDSA) is used for the ECDHE_ECDSA cipher suite, does not properly implement curves over binary fields, which makes it easier for context-dependent attackers to determine private keys via a timing attack and a lattice calculation.
network
high complexity
openssl CWE-310
2.6