2 results (0.004 seconds)

CVSS: 7.4EPSS: 0%CPEs: 56EXPL: 0

The X509_V_FLAG_X509_STRICT flag enables additional security checks of the certificates present in a certificate chain. It is not set by default. Starting from OpenSSL version 1.1.1h a check to disallow certificates in the chain that have explicitly encoded elliptic curve parameters was added as an additional strict check. An error in the implementation of this check meant that the result of a previous check to confirm that certificates in the chain are valid CA certificates was overwritten. This effectively bypasses the check that non-CA certificates must not be able to issue other certificates. • http://www.openwall.com/lists/oss-security/2021/03/27/1 http://www.openwall.com/lists/oss-security/2021/03/27/2 http://www.openwall.com/lists/oss-security/2021/03/28/3 http://www.openwall.com/lists/oss-security/2021/03/28/4 https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=2a40b7bc7b94dd7de897a74571e7024f0cf0d63b https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845 https://kc.mc • CWE-295: Improper Certificate Validation •

CVSS: 5.0EPSS: 7%CPEs: 4EXPL: 0

McAfee Network Agent (mcnasvc.exe) 1.0.178.0, as used by multiple McAfee products possibly including Internet Security Suite, Personal Firewall Plus, and VirusScan, allows remote attackers to cause a denial of service (agent crash) via a long packet, possibly because of an invalid string position field value. NOTE: some of these details are obtained from third party information. McAfee Network Agent (mcnasvc.exe) 1.0.178.0, según lo utilizado por múltiples productos McAfee posiblemente incluyendo Internet Security Suite, Personal Firewall Plus, y VirusScan, permiten a un atacante remoto provocar denegación de servicio (caida del agente) a través de un gran paquete, posiblemente a causa de un valor de posición de cadena inválido. NOTA: algunos de los detalles de esta información se obtuvieron de terceros. • http://secunia.com/advisories/22371 http://securitydot.net/xpl/exploits/vulnerabilities/articles/1659/exploit.html http://securityreason.com/securityalert/1750 http://securitytracker.com/id?1017057 http://www.securityfocus.com/archive/1/448546/100/0/threaded http://www.securityfocus.com/bid/20496 https://exchange.xforce.ibmcloud.com/vulnerabilities/29501 •