5 results (0.004 seconds)

CVSS: 9.8EPSS: 0%CPEs: 4EXPL: 0

A double free or use after free could occur after SSL_clear in OpenBSD 7.2 before errata 026 and 7.3 before errata 004, and in LibreSSL before 3.6.3 and 3.7.x before 3.7.3. NOTE: OpenSSL is not affected. • https://ftp.openbsd.org/pub/OpenBSD/LibreSSL/libressl-3.6.3-relnotes.txt https://ftp.openbsd.org/pub/OpenBSD/LibreSSL/libressl-3.7.3-relnotes.txt https://ftp.openbsd.org/pub/OpenBSD/patches/7.2/common/026_ssl.patch.sig https://ftp.openbsd.org/pub/OpenBSD/patches/7.3/common/004_ssl.patch.sig https://github.com/libressl/openbsd/commit/e42d8f4b21a8a498e2eabbffe4c7b7d4ef7cec54 • CWE-415: Double Free CWE-416: Use After Free •

CVSS: 9.8EPSS: 0%CPEs: 2EXPL: 0

x509/x509_verify.c in LibreSSL before 3.4.2, and OpenBSD before 7.0 errata 006, allows authentication bypass because an error for an unverified certificate chain is sometimes discarded. • https://ftp.openbsd.org/pub/OpenBSD/LibreSSL/libressl-3.4.2-relnotes.txt https://ftp.openbsd.org/pub/OpenBSD/patches/7.0/common/006_x509.patch.sig https://github.com/openbsd/src/commit/3f851282810fa0ab4b90b3b1ecec2e8717ef16f8 https://security.netapp.com/advisory/ntap-20230517-0006 • CWE-295: Improper Certificate Validation •

CVSS: 5.3EPSS: 0%CPEs: 2EXPL: 0

An issue was discovered in x509/x509_verify.c in LibreSSL before 3.6.1, and in OpenBSD before 7.2 errata 001. x509_verify_ctx_add_chain does not store errors that occur during leaf certificate verification, and therefore an incorrect error is returned. This behavior occurs when there is an installed verification callback that instructs the verifier to continue upon detecting an invalid certificate. • https://ftp.openbsd.org/pub/OpenBSD/LibreSSL/libressl-3.6.1-relnotes.txt https://ftp.openbsd.org/pub/OpenBSD/patches/7.2/common/001_x509.patch.sig https://github.com/openbsd/src/commit/4f94258c65a918ee3d8670e93916d15bf879e6ec • CWE-295: Improper Certificate Validation •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 1

x509_constraints_parse_mailbox in lib/libcrypto/x509/x509_constraints.c in LibreSSL through 3.4.0 has a stack-based buffer over-read. When the input exceeds DOMAIN_PART_MAX_LEN, the buffer lacks '\0' termination. La función x509_constraints_parse_mailbox en el archivo lib/libcrypto/x509/x509_constraints.c en LibreSSL versiones hasta 3.4.0, presenta una lectura excesiva del búfer en la región stack de la memoria. Cuando la entrada excede DOMAIN_PART_MAX_LEN, el búfer carece de terminación "\0". • https://github.com/libressl-portable/openbsd/issues/126 • CWE-125: Out-of-bounds Read •

CVSS: 4.7EPSS: 0%CPEs: 5EXPL: 0

LibreSSL before 2.6.5 and 2.7.x before 2.7.4 allows a memory-cache side-channel attack on DSA and ECDSA signatures, aka the Return Of the Hidden Number Problem or ROHNP. To discover a key, the attacker needs access to either the local machine or a different virtual machine on the same physical host. LibreSSL en versiones anteriores a la 2.6.5 y versiones 2.7.x anteriores a la 2.7.4 permite un ataque de canal lateral por caché de memoria en las firmas DSA y ECDSA. Esto también se conoce como Return Of the Hidden Number Problem (ROHNP). Para descubrir una clave, el atacante necesita acceso a la máquina local o a una máquina virtual diferente en el mismo host físico. • https://ftp.openbsd.org/pub/OpenBSD/LibreSSL/libressl-2.6.5-relnotes.txt https://ftp.openbsd.org/pub/OpenBSD/LibreSSL/libressl-2.7.4-relnotes.txt https://www.nccgroup.trust/us/our-research/technical-advisory-return-of-the-hidden-number-problem • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •