3 results (0.005 seconds)

CVSS: 5.9EPSS: 0%CPEs: 205EXPL: 0

An OpenSSL TLS server may crash if sent a maliciously crafted renegotiation ClientHello message from a client. If a TLSv1.2 renegotiation ClientHello omits the signature_algorithms extension (where it was present in the initial ClientHello), but includes a signature_algorithms_cert extension then a NULL pointer dereference will result, leading to a crash and a denial of service attack. A server is only vulnerable if it has TLSv1.2 and renegotiation enabled (which is the default configuration). OpenSSL TLS clients are not impacted by this issue. All OpenSSL 1.1.1 versions are affected by this issue. • http://www.openwall.com/lists/oss-security/2021/03/27/1 http://www.openwall.com/lists/oss-security/2021/03/27/2 http://www.openwall.com/lists/oss-security/2021/03/28/3 http://www.openwall.com/lists/oss-security/2021/03/28/4 https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf https://cert-portal.siemens.com/productcert/pdf/ssa-772220.pdf https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=fb9fa6b51defd48157eeb207f52181f735d96148 https://kb.pulse • CWE-476: NULL Pointer Dereference •

CVSS: 10.0EPSS: 0%CPEs: 6EXPL: 0

The web server on the Siemens Scalance S Security Module firewall S602 V2, S612 V2, and S613 V2 with firmware before 2.3.0.3 does not limit the rate of authentication attempts, which makes it easier for remote attackers to obtain access via a brute-force attack on the administrative password. Ell servidor web en el cortafuegos Siemens Scalance S Security Module S602 V2, S612 V2, and S613 V2 con el firmware anterior a v2.3.0.3 no limita la tasa de intentos de autenticación, lo que hace que sea más fácil para los atacantes remotos obtener acceso a través de un ataque de fuerza bruta sobre la contraseña administrativa. • http://osvdb.org/81033 http://support.automation.siemens.com/WW/view/en/59869684 http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-268149.pdf http://www.us-cert.gov/control_systems/pdf/ICSA-12-102-05.pdf • CWE-287: Improper Authentication •

CVSS: 6.1EPSS: 4%CPEs: 6EXPL: 0

Stack-based buffer overflow in the Profinet DCP protocol implementation on the Siemens Scalance S Security Module firewall S602 V2, S612 V2, and S613 V2 with firmware before 2.3.0.3 allows remote attackers to cause a denial of service (device outage) or possibly execute arbitrary code via a crafted DCP frame. Desbordamiento de búfer basado en pila en la implementación del protocolo Profinet DCP en Siemens Scalance S Security Module firewall S602 V2, S612 V2, S613 V2 con el firmware anterior a v2.3.0.3, permite a atacantes remotos causar una denegación de servicio (interrupción del dispositivo) o ejecutar, posiblemente, código arbitrario a través de un marco de DCP manipulado. • http://osvdb.org/81034 http://support.automation.siemens.com/WW/view/en/59869684 http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-268149.pdf http://www.us-cert.gov/control_systems/pdf/ICSA-12-102-05.pdf • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •