Page 17 of 166 results (0.013 seconds)

CVSS: 1.9EPSS: 0%CPEs: 96EXPL: 0

The Montgomery ladder implementation in OpenSSL through 1.0.0l does not ensure that certain swap operations have a constant-time behavior, which makes it easier for local users to obtain ECDSA nonces via a FLUSH+RELOAD cache side-channel attack. La implementación de la escala Montgomery en OpenSSL hasta la versión 1.0.0l no asegura que ciertas operaciones de intercambio tengan un comportamiento constante en el tiempo, lo que facilita a usuarios locales obtener nonces ECDSA a través de un ataque de caché de canal lateral FLUSH+RELOAD. • http://advisories.mageia.org/MGASA-2014-0165.html http://eprint.iacr.org/2014/140 http://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=2198be3483259de374f91e57d247d0fc667aef29 http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10629 http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html http://lists.opensuse.org/opensuse-updates/2014-04/msg00007.html http://marc.info/?l=bugtraq&m=140266410314613&w=2 http://marc.info/?l=bugtraq&m=140317760000786&w=2 http&# • CWE-310: Cryptographic Issues •

CVSS: 4.3EPSS: 54%CPEs: 9EXPL: 0

The ssl3_take_mac function in ssl/s3_both.c in OpenSSL 1.0.1 before 1.0.1f allows remote TLS servers to cause a denial of service (NULL pointer dereference and application crash) via a crafted Next Protocol Negotiation record in a TLS handshake. La función ssl3_take_mac en ssl/s3_both.c en OpenSSL 1.0.1 anterior a 1.0.1f permite a los servidores TLS remotos provocar una denegación de servicio (referencia a un puntero NULL y caída de aplicación) a través de un registro Next Protocol Negotiation modificado en un TLS handshake. • http://git.openssl.org/gitweb/?p=openssl.git%3Ba=blob_plain%3Bf=CHANGES%3Bhb=refs/heads/OpenSSL_1_0_1-stable http://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=197e0ea817ad64820789d86711d55ff50d71f631 http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136470.html http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.html http://lists.opensuse.org/opensuse-updates/2014-01/msg00065.html http://lists.opensuse.org/opensuse-updates/2014-01/msg00067.html http: • CWE-20: Improper Input Validation CWE-476: NULL Pointer Dereference •

CVSS: 5.8EPSS: 2%CPEs: 25EXPL: 0

The DTLS retransmission implementation in OpenSSL 1.0.0 before 1.0.0l and 1.0.1 before 1.0.1f does not properly maintain data structures for digest and encryption contexts, which might allow man-in-the-middle attackers to trigger the use of a different context and cause a denial of service (application crash) by interfering with packet delivery, related to ssl/d1_both.c and ssl/t1_enc.c. La implementación de retransmisión DTLS en OpenSSL través 0.9.8y y 1.x través 1.0.1e no mantiene adecuadamente las estructuras de datos para sumarios (hashes) y contextos de cifrado, lo que podría permitir a atacantes man-in-the-middle para activar el uso de un contexto diferente e interferir con la entrega de paquetes, relacionado con ssl/d1_both.c y ssl/t1_enc.c. • http://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=34628967f1e65dc8f34e000f0f5518e21afbfc7b http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136470.html http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.html http://lists.opensuse.org/opensuse-updates/2014-01/msg00031.html http://lists.opensuse.org/opensuse-updates/2014-01/msg00032.html http://rhn.redhat.com/errata/RHSA-2014-0015.html http://seclists.org/fulldisclosure/2014/Dec/23 http://security. • CWE-310: Cryptographic Issues •

CVSS: 5.0EPSS: 92%CPEs: 25EXPL: 0

The ssl_get_algorithm2 function in ssl/s3_lib.c in OpenSSL before 1.0.2 obtains a certain version number from an incorrect data structure, which allows remote attackers to cause a denial of service (daemon crash) via crafted traffic from a TLS 1.2 client. La función ssl_get_algorithm2 en ssl/s3_lib.c en OpenSSL anterior a v1.0.2 obtiene un cierto número de versión de una estructura de datos incorrectos, lo que permite a atacantes remotos provocar una denegación de servicio (caída del demonio) a través de tráfico de red de un cliente TLS v1.2. • http://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=ca989269a2876bae79393bd54c3e72d49975fc75 http://lists.fedoraproject.org/pipermail/package-announce/2013-December/124833.html http://lists.fedoraproject.org/pipermail/package-announce/2013-December/124854.html http://lists.fedoraproject.org/pipermail/package-announce/2013-December/124858.html http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136470.html http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.html http://lists • CWE-310: Cryptographic Issues •

CVSS: 5.0EPSS: 18%CPEs: 4EXPL: 0

crypto/evp/e_aes_cbc_hmac_sha1.c in the AES-NI functionality in the TLS 1.1 and 1.2 implementations in OpenSSL 1.0.1 before 1.0.1d allows remote attackers to cause a denial of service (application crash) via crafted CBC data. crypto/evp/e_aes_cbc_hmac_sha1.c en la funcionalidad AES-NI en el TLS v1.1 y v1.2 en las implementaciones OpenSSL v1.0.1d antes de v1.0.1 permite a atacantes remotos provocar una denegación de servicio (caída de aplicación) a través de los datos de CBC artesanales. • http://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=125093b59f3c2a2d33785b5563d929d0472f1721 http://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html http://marc.info/?l=bugtraq&m=137545771702053&w=2 http://secunia.com/advisories/55108 http://secunia.com/advisories/55139 http://support.apple.com/kb/HT5880 http://www.openssl.org/news/secadv_20130204.txt http://www.securityfocus.com/bid/57755 https://bugzilla.redhat.com/show_bug.cgi?id=908029 https://oval. • CWE-310: Cryptographic Issues •