3 results (0.010 seconds)

CVSS: 5.9EPSS: 0%CPEs: 205EXPL: 0

An OpenSSL TLS server may crash if sent a maliciously crafted renegotiation ClientHello message from a client. If a TLSv1.2 renegotiation ClientHello omits the signature_algorithms extension (where it was present in the initial ClientHello), but includes a signature_algorithms_cert extension then a NULL pointer dereference will result, leading to a crash and a denial of service attack. A server is only vulnerable if it has TLSv1.2 and renegotiation enabled (which is the default configuration). OpenSSL TLS clients are not impacted by this issue. All OpenSSL 1.1.1 versions are affected by this issue. • http://www.openwall.com/lists/oss-security/2021/03/27/1 http://www.openwall.com/lists/oss-security/2021/03/27/2 http://www.openwall.com/lists/oss-security/2021/03/28/3 http://www.openwall.com/lists/oss-security/2021/03/28/4 https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf https://cert-portal.siemens.com/productcert/pdf/ssa-772220.pdf https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=fb9fa6b51defd48157eeb207f52181f735d96148 https://kb.pulse • CWE-476: NULL Pointer Dereference •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

A vulnerability was discovered in Siemens SIMATIC Logon (All versions before V1.6) that could allow specially crafted packets sent to the SIMATIC Logon Remote Access service on port 16389/tcp to cause a Denial-of-Service condition. The service restarts automatically. Se ha descubierto una vulnerabilidad en Siemens SIMATIC Logon (todas las versiones anteriores a la V1.6) que podría permitir que se enviasen paquetes especialmente manipulados al servicio SIMATIC Logon Remote Access en el puerto 16389/tcp para provocar una denegación de servicio. El servicio se reinicia automáticamente. • http://www.securityfocus.com/bid/99539 https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-804859.pdf https://www.tenable.com/security/research/tra-2017-34 • CWE-20: Improper Input Validation CWE-787: Out-of-bounds Write •

CVSS: 9.0EPSS: 0%CPEs: 1EXPL: 0

Siemens SIMATIC Logon prior to V1.5 SP3 Update 2 could allow an attacker with knowledge of a valid user name, and physical or network access to the affected system, to bypass the application-level authentication. Siemens SIMATIC Logon en versiones anteriores a V1.5 SP3 Update 2 podría permitir a un atacante con conocimiento de un nombre de usuario válido, y acceso físico o de red al sistema afectado, eludir la autenticación a nivel de aplicación. • http://www.securityfocus.com/bid/96208 https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-931064.pdf • CWE-592: DEPRECATED: Authentication Bypass Issues •