// For flags

CVE-2012-2131

OpenSSL - ASN1 BIO Memory Corruption

Severity Score

7.5
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Multiple integer signedness errors in crypto/buffer/buffer.c in OpenSSL 0.9.8v allow remote attackers to conduct buffer overflow attacks, and cause a denial of service (memory corruption) or possibly have unspecified other impact, via crafted DER data, as demonstrated by an X.509 certificate or an RSA public key. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-2110.

Múltiples errores de signo en enteros en crypto/buffer/buffer.c en OpenSSL v0.9.8v permite a atacantes remotos realizar ataques de desbordamiento de buffer, y provocar una denegación de servicio (corrupción de memoria) o posiblemente tener otro impacto no especificado, a través de datos DER modificados, como se demuestra con un certificado X.509 o una clave pública RSA. NOTA: esta vulnerabilidad existe debido a una solución incompleta para CVE-2012-2110.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2012-04-04 CVE Reserved
  • 2012-04-19 First Exploit
  • 2012-04-24 CVE Published
  • 2024-08-06 CVE Updated
  • 2024-10-23 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-189: Numeric Errors
CAPEC
References (22)
URL Date SRC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Openssl
Search vendor "Openssl"
Openssl
Search vendor "Openssl" for product "Openssl"
0.9.8v
Search vendor "Openssl" for product "Openssl" and version "0.9.8v"
-
Affected