5 results (0.004 seconds)

CVSS: 7.4EPSS: 0%CPEs: 56EXPL: 0

The X509_V_FLAG_X509_STRICT flag enables additional security checks of the certificates present in a certificate chain. It is not set by default. Starting from OpenSSL version 1.1.1h a check to disallow certificates in the chain that have explicitly encoded elliptic curve parameters was added as an additional strict check. An error in the implementation of this check meant that the result of a previous check to confirm that certificates in the chain are valid CA certificates was overwritten. This effectively bypasses the check that non-CA certificates must not be able to issue other certificates. • http://www.openwall.com/lists/oss-security/2021/03/27/1 http://www.openwall.com/lists/oss-security/2021/03/27/2 http://www.openwall.com/lists/oss-security/2021/03/28/3 http://www.openwall.com/lists/oss-security/2021/03/28/4 https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=2a40b7bc7b94dd7de897a74571e7024f0cf0d63b https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845 https://kc.mc • CWE-295: Improper Certificate Validation •

CVSS: 5.9EPSS: 0%CPEs: 205EXPL: 0

An OpenSSL TLS server may crash if sent a maliciously crafted renegotiation ClientHello message from a client. If a TLSv1.2 renegotiation ClientHello omits the signature_algorithms extension (where it was present in the initial ClientHello), but includes a signature_algorithms_cert extension then a NULL pointer dereference will result, leading to a crash and a denial of service attack. A server is only vulnerable if it has TLSv1.2 and renegotiation enabled (which is the default configuration). OpenSSL TLS clients are not impacted by this issue. All OpenSSL 1.1.1 versions are affected by this issue. • http://www.openwall.com/lists/oss-security/2021/03/27/1 http://www.openwall.com/lists/oss-security/2021/03/27/2 http://www.openwall.com/lists/oss-security/2021/03/28/3 http://www.openwall.com/lists/oss-security/2021/03/28/4 https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf https://cert-portal.siemens.com/productcert/pdf/ssa-772220.pdf https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=fb9fa6b51defd48157eeb207f52181f735d96148 https://kb.pulse • CWE-476: NULL Pointer Dereference •

CVSS: 4.9EPSS: 0%CPEs: 2EXPL: 0

A post-authenticated vulnerability in SonicWall SMA100 allows an attacker to export the configuration file to the specified email address. This vulnerability impacts SMA100 version 10.2.0.5 and earlier. Una vulnerabilidad posterior a una autenticación en SonicWall SMA100, permite a un atacante exportar el archivo de configuración a la dirección de correo electrónico especificada. Esta vulnerabilidad afecta a SMA100 versiones 10.2.0.5 y anteriores • https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0005 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE-287: Improper Authentication •

CVSS: 9.0EPSS: 0%CPEs: 2EXPL: 0

A post-authenticated command injection vulnerability in SonicWall SMA100 allows an authenticated attacker to execute OS commands as a 'nobody' user. This vulnerability impacts SMA100 version 10.2.0.5 and earlier. Una vulnerabilidad de inyección de comandos posterior a la autenticación en SonicWall SMA100, permite a un atacante autenticado ejecutar comandos del Sistema Operativo como un usuario "nobody". Esta vulnerabilidad afecta a SMA100 versiones 10.2.0.5 y anteriores • https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0004 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 5.3EPSS: 0%CPEs: 4EXPL: 0

SonicWall SSL-VPN products and SonicWall firewall SSL-VPN feature misconfiguration leads to possible DNS flaw known as domain name collision vulnerability. When the users publicly display their organization’s internal domain names in the SSL-VPN authentication page, an attacker with knowledge of internal domain names can potentially take advantage of this vulnerability. Los productos SonicWall SSL-VPN y una configuración inapropiada de la funcionalidad SSL-VPN del firewall SonicWall, conlleva a un posible fallo de DNS conocido como vulnerabilidad de colisión de nombres de dominio. Cuando los usuarios muestran públicamente los nombres de dominio internos de su organización en la página de autenticación SSL-VPN, un atacante con conocimiento de los nombres de dominio internos puede potencialmente aprovecharse de esta vulnerabilidad • https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2020-0006 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •