Vulnerabilities > Openssl > Openssl > 1.0.2d

DATE CVE VULNERABILITY TITLE RISK
2024-01-26 CVE-2024-0727 Unspecified vulnerability in Openssl
Issue summary: Processing a maliciously formatted PKCS12 file may lead OpenSSL to crash leading to a potential Denial of Service attack Impact summary: Applications loading files in the PKCS12 format from untrusted sources might terminate abruptly. A file in PKCS12 format can contain certificates and keys and may come from an untrusted source.
local
low complexity
openssl
5.5
2023-11-06 CVE-2023-5678 Improper Check for Unusual or Exceptional Conditions vulnerability in Openssl
Issue summary: Generating excessively long X9.42 DH keys or checking excessively long X9.42 DH keys or parameters may be very slow. Impact summary: Applications that use the functions DH_generate_key() to generate an X9.42 DH key may experience long delays.
network
low complexity
openssl CWE-754
5.3
2023-07-31 CVE-2023-3817 Excessive Iteration vulnerability in Openssl
Issue summary: Checking excessively long DH keys or parameters may be very slow. Impact summary: Applications that use the functions DH_check(), DH_check_ex() or EVP_PKEY_param_check() to check a DH key or DH parameters may experience long delays.
network
low complexity
openssl CWE-834
5.3
2023-05-30 CVE-2023-2650 Allocation of Resources Without Limits or Throttling vulnerability in multiple products
Issue summary: Processing some specially crafted ASN.1 object identifiers or data containing them may be very slow. Impact summary: Applications that use OBJ_obj2txt() directly, or use any of the OpenSSL subsystems OCSP, PKCS7/SMIME, CMS, CMP/CRMF or TS with no message size limit may experience notable to very long delays when processing those messages, which may lead to a Denial of Service. An OBJECT IDENTIFIER is composed of a series of numbers - sub-identifiers - most of which have no size limit.
network
low complexity
openssl debian CWE-770
6.5
2023-03-28 CVE-2023-0465 Improper Certificate Validation vulnerability in Openssl
Applications that use a non-default option when verifying certificates may be vulnerable to an attack from a malicious CA to circumvent certain checks. Invalid certificate policies in leaf certificates are silently ignored by OpenSSL and other certificate policy checks are skipped for that certificate. A malicious CA could use this to deliberately assert invalid certificate policies in order to circumvent policy checking on the certificate altogether. Policy processing is disabled by default but can be enabled by passing the `-policy' argument to the command line utilities or by calling the `X509_VERIFY_PARAM_set1_policies()' function.
network
low complexity
openssl CWE-295
5.3
2023-03-28 CVE-2023-0466 Improper Certificate Validation vulnerability in Openssl
The function X509_VERIFY_PARAM_add0_policy() is documented to implicitly enable the certificate policy check when doing certificate verification.
network
low complexity
openssl CWE-295
5.3
2023-03-22 CVE-2023-0464 Improper Certificate Validation vulnerability in Openssl
A security vulnerability has been identified in all supported versions of OpenSSL related to the verification of X.509 certificate chains that include policy constraints.
network
low complexity
openssl CWE-295
7.5
2023-02-08 CVE-2022-4304 Information Exposure Through Discrepancy vulnerability in multiple products
A timing based side channel exists in the OpenSSL RSA Decryption implementation which could be sufficient to recover a plaintext across a network in a Bleichenbacher style attack.
network
high complexity
openssl stormshield CWE-203
5.9
2023-02-08 CVE-2023-0215 Use After Free vulnerability in multiple products
The public API function BIO_new_NDEF is a helper function used for streaming ASN.1 data via a BIO.
network
low complexity
openssl stormshield CWE-416
7.5
2023-02-08 CVE-2023-0286 Type Confusion vulnerability in multiple products
There is a type confusion vulnerability relating to X.400 address processing inside an X.509 GeneralName.
network
high complexity
openssl stormshield CWE-843
7.4