This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Openssl First view 1999-03-22
Product Openssl Last view 2020-04-21
Version Type Application
Update  
Edition  
Language  
Sofware Edition  
Target Software  
Target Hardware  
Other  

Activity : Overall

COMMON PLATFORM ENUMERATION: Repartition per Version

CPE Name Affected CVE
cpe:2.3:a:openssl:openssl:0.9.6:*:*:*:*:*:*:* 105
cpe:2.3:a:openssl:openssl:0.9.7:*:*:*:*:*:*:* 105
cpe:2.3:a:openssl:openssl:0.9.8c:*:*:*:*:*:*:* 104
cpe:2.3:a:openssl:openssl:0.9.8h:*:*:*:*:*:*:* 103
cpe:2.3:a:openssl:openssl:0.9.8f:*:*:*:*:*:*:* 103
cpe:2.3:a:openssl:openssl:0.9.8i:*:*:*:*:*:*:* 102
cpe:2.3:a:openssl:openssl:0.9.6a:*:*:*:*:*:*:* 102
cpe:2.3:a:openssl:openssl:0.9.8g:*:*:*:*:*:*:* 102
cpe:2.3:a:openssl:openssl:0.9.8j:*:*:*:*:*:*:* 101
cpe:2.3:a:openssl:openssl:0.9.6d:*:*:*:*:*:*:* 101
cpe:2.3:a:openssl:openssl:0.9.6b:*:*:*:*:*:*:* 101
cpe:2.3:a:openssl:openssl:0.9.6c:*:*:*:*:*:*:* 101
cpe:2.3:a:openssl:openssl:0.9.7a:*:*:*:*:*:*:* 101
cpe:2.3:a:openssl:openssl:0.9.8m:*:*:*:*:*:*:* 100
cpe:2.3:a:openssl:openssl:0.9.8l:*:*:*:*:*:*:* 100
cpe:2.3:a:openssl:openssl:0.9.8k:*:*:*:*:*:*:* 100
cpe:2.3:a:openssl:openssl:0.9.8e:*:*:*:*:*:*:* 100
cpe:2.3:a:openssl:openssl:0.9.4:*:*:*:*:*:*:* 100
cpe:2.3:a:openssl:openssl:0.9.8d:*:*:*:*:*:*:* 100
cpe:2.3:a:openssl:openssl:0.9.8n:*:*:*:*:*:*:* 99
cpe:2.3:a:openssl:openssl:0.9.8o:*:*:*:*:*:*:* 99
cpe:2.3:a:openssl:openssl:0.9.2b:*:*:*:*:*:*:* 99
cpe:2.3:a:openssl:openssl:0.9.7d:*:*:*:*:*:*:* 99
cpe:2.3:a:openssl:openssl:0.9.6e:*:*:*:*:*:*:* 99
cpe:2.3:a:openssl:openssl:0.9.1c:*:*:*:*:*:*:* 99
cpe:2.3:a:openssl:openssl:0.9.3:*:*:*:*:*:*:* 99
cpe:2.3:a:openssl:openssl:0.9.7b:*:*:*:*:*:*:* 99
cpe:2.3:a:openssl:openssl:0.9.5:*:*:*:*:*:*:* 99
cpe:2.3:a:openssl:openssl:0.9.7c:*:*:*:*:*:*:* 99
cpe:2.3:a:openssl:openssl:0.9.8q:*:*:*:*:*:*:* 98
cpe:2.3:a:openssl:openssl:0.9.7:beta1:*:*:*:*:*:* 98
cpe:2.3:a:openssl:openssl:0.9.6h:*:*:*:*:*:*:* 98
cpe:2.3:a:openssl:openssl:0.9.6g:*:*:*:*:*:*:* 98
cpe:2.3:a:openssl:openssl:0.9.5a:*:*:*:*:*:*:* 98
cpe:2.3:a:openssl:openssl:0.9.7:beta2:*:*:*:*:*:* 98
cpe:2.3:a:openssl:openssl:1.0.1c:*:*:*:*:*:*:* 98
cpe:2.3:a:openssl:openssl:0.9.6i:*:*:*:*:*:*:* 97
cpe:2.3:a:openssl:openssl:0.9.7e:*:*:*:*:*:*:* 97
cpe:2.3:a:openssl:openssl:0.9.7f:*:*:*:*:*:*:* 97
cpe:2.3:a:openssl:openssl:0.9.7g:*:*:*:*:*:*:* 97
cpe:2.3:a:openssl:openssl:0.9.8s:*:*:*:*:*:*:* 97
cpe:2.3:a:openssl:openssl:0.9.8r:*:*:*:*:*:*:* 97
cpe:2.3:a:openssl:openssl:0.9.7k:*:*:*:*:*:*:* 96
cpe:2.3:a:openssl:openssl:0.9.7j:*:*:*:*:*:*:* 96
cpe:2.3:a:openssl:openssl:0.9.8v:*:*:*:*:*:*:* 96
cpe:2.3:a:openssl:openssl:1.0.1d:*:*:*:*:*:*:* 96
cpe:2.3:a:openssl:openssl:1.0.1e:*:*:*:*:*:*:* 96
cpe:2.3:a:openssl:openssl:0.9.7h:*:*:*:*:*:*:* 95
cpe:2.3:a:openssl:openssl:0.9.7i:*:*:*:*:*:*:* 95
cpe:2.3:a:openssl:openssl:0.9.6f:*:*:*:*:*:*:* 95

Related : CVE

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
  Date Alert Description
7.5 2020-04-21 CVE-2020-1967

Server or client applications that call the SSL_check_chain() function during or after a TLS 1.3 handshake may crash due to a NULL pointer dereference as a result of incorrect handling of the "signature_algorithms_cert" TLS extension. The crash occurs if an invalid or unrecognised signature algorithm is received from the peer. This could be exploited by a malicious peer in a Denial of Service attack. OpenSSL version 1.1.1d, 1.1.1e, and 1.1.1f are affected by this issue. This issue did not affect OpenSSL versions prior to 1.1.1d. Fixed in OpenSSL 1.1.1g (Affected 1.1.1d-1.1.1f).

9.1 2020-02-27 CVE-2020-7043

An issue was discovered in openfortivpn 1.11.0 when used with OpenSSL before 1.0.2. tunnel.c mishandles certificate validation because hostname comparisons do not consider '\0' characters, as demonstrated by a good.example.com\x00evil.example.com attack.

5.3 2020-02-27 CVE-2020-7042

An issue was discovered in openfortivpn 1.11.0 when used with OpenSSL 1.0.2 or later. tunnel.c mishandles certificate validation because the hostname check operates on uninitialized memory. The outcome is that a valid certificate is never accepted (only a malformed certificate may be accepted).

5.3 2020-02-27 CVE-2020-7041

An issue was discovered in openfortivpn 1.11.0 when used with OpenSSL 1.0.2 or later. tunnel.c mishandles certificate validation because an X509_check_host negative error code is interpreted as a successful return value.

5.3 2019-12-06 CVE-2019-1551

There is an overflow bug in the x64_64 Montgomery squaring procedure used in exponentiation with 512-bit moduli. No EC algorithms are affected. Analysis suggests that attacks against 2-prime RSA1024, 3-prime RSA1536, and DSA1024 as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH512 are considered just feasible. However, for an attack the target would have to re-use the DH512 private key, which is not recommended anyway. Also applications directly using the low level API BN_mod_exp may be affected if they use BN_FLG_CONSTTIME. Fixed in OpenSSL 1.1.1e (Affected 1.1.1-1.1.1d). Fixed in OpenSSL 1.0.2u (Affected 1.0.2-1.0.2t).

3.7 2019-09-10 CVE-2019-1563

In situations where an attacker receives automated notification of the success or failure of a decryption attempt an attacker, after sending a very large number of messages to be decrypted, can recover a CMS/PKCS7 transported encryption key or decrypt any RSA encrypted message that was encrypted with the public RSA key, using a Bleichenbacher padding oracle attack. Applications are not affected if they use a certificate together with the private RSA key to the CMS_decrypt or PKCS7_decrypt functions to select the correct recipient info to decrypt. Fixed in OpenSSL 1.1.1d (Affected 1.1.1-1.1.1c). Fixed in OpenSSL 1.1.0l (Affected 1.1.0-1.1.0k). Fixed in OpenSSL 1.0.2t (Affected 1.0.2-1.0.2s).

5.3 2019-09-10 CVE-2019-1549

OpenSSL 1.1.1 introduced a rewritten random number generator (RNG). This was intended to include protection in the event of a fork() system call in order to ensure that the parent and child processes did not share the same RNG state. However this protection was not being used in the default case. A partial mitigation for this issue is that the output from a high precision timer is mixed into the RNG state so the likelihood of a parent and child process sharing state is significantly reduced. If an application already calls OPENSSL_init_crypto() explicitly using OPENSSL_INIT_ATFORK then this problem does not occur at all. Fixed in OpenSSL 1.1.1d (Affected 1.1.1-1.1.1c).

4.7 2019-09-10 CVE-2019-1547

Normally in OpenSSL EC groups always have a co-factor present and this is used in side channel resistant code paths. However, in some cases, it is possible to construct a group using explicit parameters (instead of using a named curve). In those cases it is possible that such a group does not have the cofactor present. This can occur even where all the parameters match a known named curve. If such a curve is used then OpenSSL falls back to non-side channel resistant code paths which may result in full key recovery during an ECDSA signature operation. In order to be vulnerable an attacker would have to have the ability to time the creation of a large number of signatures where explicit parameters with no co-factor present are in use by an application using libcrypto. For the avoidance of doubt libssl is not vulnerable because explicit parameters are never used. Fixed in OpenSSL 1.1.1d (Affected 1.1.1-1.1.1c). Fixed in OpenSSL 1.1.0l (Affected 1.1.0-1.1.0k). Fixed in OpenSSL 1.0.2t (Affected 1.0.2-1.0.2s).

3.3 2019-07-30 CVE-2019-1552

OpenSSL has internal defaults for a directory tree where it can find a configuration file as well as certificates used for verification in TLS. This directory is most commonly referred to as OPENSSLDIR, and is configurable with the --prefix / --openssldir configuration options. For OpenSSL versions 1.1.0 and 1.1.1, the mingw configuration targets assume that resulting programs and libraries are installed in a Unix-like environment and the default prefix for program installation as well as for OPENSSLDIR should be '/usr/local'. However, mingw programs are Windows programs, and as such, find themselves looking at sub-directories of 'C:/usr/local', which may be world writable, which enables untrusted users to modify OpenSSL's default configuration, insert CA certificates, modify (or even replace) existing engine modules, etc. For OpenSSL 1.0.2, '/usr/local/ssl' is used as default for OPENSSLDIR on all Unix and Windows targets, including Visual C builds. However, some build instructions for the diverse Windows targets on 1.0.2 encourage you to specify your own --prefix. OpenSSL versions 1.1.1, 1.1.0 and 1.0.2 are affected by this issue. Due to the limited scope of affected deployments this has been assessed as low severity and therefore we are not creating new releases at this time. Fixed in OpenSSL 1.1.1d (Affected 1.1.1-1.1.1c). Fixed in OpenSSL 1.1.0l (Affected 1.1.0-1.1.0k). Fixed in OpenSSL 1.0.2t (Affected 1.0.2-1.0.2s).

7.4 2019-03-06 CVE-2019-1543

ChaCha20-Poly1305 is an AEAD cipher, and requires a unique nonce input for every encryption operation. RFC 7539 specifies that the nonce value (IV) should be 96 bits (12 bytes). OpenSSL allows a variable nonce length and front pads the nonce with 0 bytes if it is less than 12 bytes. However it also incorrectly allows a nonce to be set of up to 16 bytes. In this case only the last 12 bytes are significant and any additional leading bytes are ignored. It is a requirement of using this cipher that nonce values are unique. Messages encrypted using a reused nonce value are susceptible to serious confidentiality and integrity attacks. If an application changes the default nonce length to be longer than 12 bytes and then makes a change to the leading bytes of the nonce expecting the new value to be a new unique nonce then such an application could inadvertently encrypt messages with a reused nonce. Additionally the ignored bytes in a long nonce are not covered by the integrity guarantee of this cipher. Any application that relies on the integrity of these ignored leading bytes of a long nonce may be further affected. Any OpenSSL internal use of this cipher, including in SSL/TLS, is safe because no such use sets such a long nonce value. However user applications that use this cipher directly and set a non-default nonce length to be longer than 12 bytes may be vulnerable. OpenSSL versions 1.1.1 and 1.1.0 are affected by this issue. Due to the limited scope of affected deployments this has been assessed as low severity and therefore we are not creating new releases at this time. Fixed in OpenSSL 1.1.1c (Affected 1.1.1-1.1.1b). Fixed in OpenSSL 1.1.0k (Affected 1.1.0-1.1.0j).

5.9 2019-02-27 CVE-2019-1559

If an application encounters a fatal protocol error and then calls SSL_shutdown() twice (once to send a close_notify, and once to receive one) then OpenSSL can respond differently to the calling application if a 0 byte record is received with invalid padding compared to if a 0 byte record is received with an invalid MAC. If the application then behaves differently based on that in a way that is detectable to the remote peer, then this amounts to a padding oracle that could be used to decrypt data. In order for this to be exploitable "non-stitched" ciphersuites must be in use. Stitched ciphersuites are optimised implementations of certain commonly used ciphersuites. Also the application must call SSL_shutdown() twice even if a protocol error has occurred (applications should not do this but some do anyway). Fixed in OpenSSL 1.0.2r (Affected 1.0.2-1.0.2q).

7.5 2019-01-30 CVE-2019-0190

A bug exists in the way mod_ssl handled client renegotiations. A remote attacker could send a carefully crafted request that would cause mod_ssl to enter a loop leading to a denial of service. This bug can be only triggered with Apache HTTP Server version 2.4.37 when using OpenSSL version 1.1.1 or later, due to an interaction in changes to handling of renegotiation attempts.

4.7 2018-11-15 CVE-2018-5407

Simultaneous Multi-threading (SMT) in processors can enable local users to exploit software vulnerable to timing attacks via a side-channel timing attack on 'port contention'.

5.9 2018-10-30 CVE-2018-0734

The OpenSSL DSA signature algorithm has been shown to be vulnerable to a timing side channel attack. An attacker could use variations in the signing algorithm to recover the private key. Fixed in OpenSSL 1.1.1a (Affected 1.1.1). Fixed in OpenSSL 1.1.0j (Affected 1.1.0-1.1.0i). Fixed in OpenSSL 1.0.2q (Affected 1.0.2-1.0.2p).

5.9 2018-10-29 CVE-2018-0735

The OpenSSL ECDSA signature algorithm has been shown to be vulnerable to a timing side channel attack. An attacker could use variations in the signing algorithm to recover the private key. Fixed in OpenSSL 1.1.0j (Affected 1.1.0-1.1.0i). Fixed in OpenSSL 1.1.1a (Affected 1.1.1).

5.5 2018-09-10 CVE-2016-7056

A timing attack flaw was found in OpenSSL 1.0.1u and before that could allow a malicious user with local access to recover ECDSA P-256 private keys.

4.9 2018-06-14 CVE-2018-12438

The Elliptic Curve Cryptography library (aka sunec or libsunec) allows a memory-cache side-channel attack on ECDSA signatures, aka the Return Of the Hidden Number Problem or ROHNP. To discover an ECDSA key, the attacker needs access to either the local machine or a different virtual machine on the same physical host.

4.9 2018-06-14 CVE-2018-12437

LibTomCrypt through 1.18.1 allows a memory-cache side-channel attack on ECDSA signatures, aka the Return Of the Hidden Number Problem or ROHNP. To discover an ECDSA key, the attacker needs access to either the local machine or a different virtual machine on the same physical host.

4.9 2018-06-14 CVE-2018-12433

** DISPUTED ** cryptlib through 3.4.4 allows a memory-cache side-channel attack on DSA and ECDSA signatures, aka the Return Of the Hidden Number Problem or ROHNP. To discover a key, the attacker needs access to either the local machine or a different virtual machine on the same physical host. NOTE: the vendor does not include side-channel attacks within its threat model.

7.5 2018-06-12 CVE-2018-0732

During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will cause the client to spend an unreasonably long period of time generating a key for this prime resulting in a hang until the client has finished. This could be exploited in a Denial Of Service attack. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2-1.0.2o).

5.9 2018-04-16 CVE-2018-0737

The OpenSSL RSA Key generation algorithm has been shown to be vulnerable to a cache timing side channel attack. An attacker with sufficient access to mount cache timing attacks during the RSA key generation process could recover the private key. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2b-1.0.2o).

6.5 2018-03-27 CVE-2018-0739

Constructed ASN.1 types with a recursive definition (such as can be found in PKCS7) could eventually exceed the stack given malicious input with excessive recursion. This could result in a Denial Of Service attack. There are no such structures used within SSL/TLS that come from untrusted sources so this is considered safe. Fixed in OpenSSL 1.1.0h (Affected 1.1.0-1.1.0g). Fixed in OpenSSL 1.0.2o (Affected 1.0.2b-1.0.2n).

5.9 2018-03-27 CVE-2018-0733

Because of an implementation bug the PA-RISC CRYPTO_memcmp function is effectively reduced to only comparing the least significant bit of each byte. This allows an attacker to forge messages that would be considered as authenticated in an amount of tries lower than that guaranteed by the security claims of the scheme. The module can only be compiled by the HP-UX assembler, so that only HP-UX PA-RISC targets are affected. Fixed in OpenSSL 1.1.0h (Affected 1.1.0-1.1.0g).

5.9 2017-12-07 CVE-2017-3738

There is an overflow bug in the AVX2 Montgomery multiplication procedure used in exponentiation with 1024-bit moduli. No EC algorithms are affected. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH1024 are considered just feasible, because most of the work necessary to deduce information about a private key may be performed offline. The amount of resources required for such an attack would be significant. However, for an attack on TLS to be meaningful, the server would have to share the DH1024 private key among multiple clients, which is no longer an option since CVE-2016-0701. This only affects processors that support the AVX2 but not ADX extensions like Intel Haswell (4th generation). Note: The impact from this issue is similar to CVE-2017-3736, CVE-2017-3732 and CVE-2015-3193. OpenSSL version 1.0.2-1.0.2m and 1.1.0-1.1.0g are affected. Fixed in OpenSSL 1.0.2n. Due to the low severity of this issue we are not issuing a new release of OpenSSL 1.1.0 at this time. The fix will be included in OpenSSL 1.1.0h when it becomes available. The fix is also available in commit e502cc86d in the OpenSSL git repository.

5.9 2017-12-07 CVE-2017-3737

OpenSSL 1.0.2 (starting from version 1.0.2b) introduced an "error state" mechanism. The intent was that if a fatal error occurred during a handshake then OpenSSL would move into the error state and would immediately fail if you attempted to continue the handshake. This works as designed for the explicit handshake functions (SSL_do_handshake(), SSL_accept() and SSL_connect()), however due to a bug it does not work correctly if SSL_read() or SSL_write() is called directly. In that scenario, if the handshake fails then a fatal error will be returned in the initial function call. If SSL_read()/SSL_write() is subsequently called by the application for the same SSL object then it will succeed and the data is passed without being decrypted/encrypted directly from the SSL/TLS record layer. In order to exploit this issue an application bug would have to be present that resulted in a call to SSL_read()/SSL_write() being issued after having already received a fatal error. OpenSSL version 1.0.2b-1.0.2m are affected. Fixed in OpenSSL 1.0.2n. OpenSSL 1.1.0 is not affected.

CWE : Common Weakness Enumeration

%idName
18% (33) CWE-310 Cryptographic Issues
15% (27) CWE-399 Resource Management Errors
12% (21) CWE-200 Information Exposure
9% (17) CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer
8% (14) CWE-20 Improper Input Validation
6% (11) CWE-189 Numeric Errors
4% (8) CWE-320 Key Management Errors
3% (6) CWE-362 Race Condition
2% (5) CWE-476 NULL Pointer Dereference
2% (4) CWE-295 Certificate Issues
2% (4) CWE-125 Out-of-bounds Read
1% (3) CWE-787 Out-of-bounds Write
1% (3) CWE-400 Uncontrolled Resource Consumption ('Resource Exhaustion')
1% (3) CWE-287 Improper Authentication
1% (3) CWE-264 Permissions, Privileges, and Access Controls
1% (3) CWE-17 Code
1% (2) CWE-311 Missing Encryption of Sensitive Data
0% (1) CWE-416 Use After Free
0% (1) CWE-330 Use of Insufficiently Random Values
0% (1) CWE-327 Use of a Broken or Risky Cryptographic Algorithm
0% (1) CWE-326 Inadequate Encryption Strength
0% (1) CWE-284 Access Control (Authorization) Issues
0% (1) CWE-254 Security Features
0% (1) CWE-190 Integer Overflow or Wraparound

CAPEC : Common Attack Pattern Enumeration & Classification

id Name
CAPEC-20 Encryption Brute Forcing
CAPEC-96 Block Access to Libraries
CAPEC-97 Cryptanalysis
CAPEC-220 Client-Server Protocol Manipulation

Oval Markup Language : Definitions

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
OvalID Name
oval:org.mitre.oval:def:461 Klima-Pokorny-Rosa Attack Vulnerability
oval:org.mitre.oval:def:466 OpenSSL No RSA Blinding Vulnerability
oval:org.mitre.oval:def:5292 Multiple Vendor OpenSSL 0.9.6, 0.9.7 ASN.1 Vulnerabilities
oval:org.mitre.oval:def:4254 OpenSSL Integer Overflow Vulnerability
oval:org.mitre.oval:def:4574 OpenSSL ASN.1 Inputs Character Tracking Vulnerability
oval:org.mitre.oval:def:2590 OpenSSL Double-free Vulnerability
oval:org.mitre.oval:def:5528 OpenSSL 0.9.6k ASN.1 DoS Vulnerability
oval:org.mitre.oval:def:164 Trustix Secure Linux der_chop Script Symlink Attack Vulnerability
oval:org.mitre.oval:def:10621 The der_chop script in the openssl package in Trustix Secure Linux 1.5 throug...
oval:org.mitre.oval:def:11454 The SSL/TLS server implementation in OpenSSL 0.9.7 before 0.9.7h and 0.9.8 be...
oval:org.mitre.oval:def:10560 OpenSSL 0.9.7 before 0.9.7l and 0.9.8 before 0.9.8d allows remote attackers t...
oval:org.mitre.oval:def:10311 OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions allows...
oval:org.mitre.oval:def:9370 Buffer overflow in the SSL_get_shared_ciphers function in OpenSSL 0.9.7 befor...
oval:org.mitre.oval:def:4256 Security Vulnerabilities in OpenSSL May Lead to a Denial of Service (DoS) to ...
oval:org.mitre.oval:def:11656 OpenSSL before 0.9.7, 0.9.7 before 0.9.7k, and 0.9.8 before 0.9.8c, when usin...
oval:org.mitre.oval:def:4356 Security Vulnerabilities in OpenSSL May Lead to a Denial of Service (DoS) to ...
oval:org.mitre.oval:def:10207 The get_server_hello function in the SSLv2 client code in OpenSSL 0.9.7 befor...
oval:org.mitre.oval:def:9984 The BN_from_montgomery function in crypto/bn/bn_mont.c in OpenSSL 0.9.8e and ...
oval:org.mitre.oval:def:7946 DSA-1571 openssl -- predictable random number generator
oval:org.mitre.oval:def:20219 DSA-1571-1 openssl - predictable random number generator
oval:org.mitre.oval:def:5337 Security Vulnerability in Solaris 10 OpenSSL SSL_get_shared_ciphers() Function
oval:org.mitre.oval:def:18654 DSA-1379-1 openssl - arbitrary code execution
oval:org.mitre.oval:def:17415 USN-522-1 -- openssl vulnerabilities
oval:org.mitre.oval:def:10904 Off-by-one error in the SSL_get_shared_ciphers function in OpenSSL 0.9.7 up t...
oval:org.mitre.oval:def:22488 ELSA-2007:0964: openssl security update (Important)

Open Source Vulnerability Database (OSVDB)

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
78320 OpenSSL DTLS Remote DoS
78191 OpenSSL GOST ENGINE Parameter Parsing Remote DoS
78190 OpenSSL Server Gated Cryptograpy (SGC) Handshake Restart Handling Remote DoS
78189 OpenSSL RFC 3779 Certificate Data Parsing Assertion Failure Remote DoS
78188 OpenSSL SSL 3.0 Record Cipher Padding Uninitialized Memory Information Disclo...
78187 OpenSSL X509_V_FLAG_POLICY_CHECK Double-free Unspecified Weakness
78186 OpenSSL Datagram Transport Layer Security (DTLS) CBC Encryption Weakness Plai...
77832 Parallels Plesk Panel Billing System TLS Renegotiation Handshakes MiTM Plaint...
75622 Blue Coat Director TLS Renegotiation Handshakes MiTM Plaintext Data Injection
75230 OpenSSL Ephemeral ECDH Ciphersuites Handshake Message Parsing Remote DoS
75229 OpenSSL Certificate Revocation Lists (CRL) nextUpdate Field Remote DoS
74632 OpenSSL ECDHE_ECDSA Cipher Suite ECDSA Timing Attack Weakness
74335 Hitachi Web Server TLS Renegotiation Handshakes MiTM Plaintext Data Injection
73894 Multiple Vendor SSL/TLS Implementation Renegotiation DoS
71961 Oracle Fusion Middleware Oracle WebLogic Server TLS Renegotiation Handshakes ...
71951 Oracle Multiple Products Oracle Security Service TLS Renegotiation Handshakes...
70847 OpenSSL ClientHello Handshake Message Parsing Invalid Memory Access
70620 mGuard TLS Renegotiation Handshakes MiTM Plaintext Data Injection
70055 Oracle Supply Chain Transportation Management TLS Renegotiation Handshakes Mi...
69657 OpenSSL J-PAKE Public Parameter Validation Shared Secret Authentication Bypass
69655 OpenSSL SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG Ciphersuite Disabled Cipher I...
69565 OpenSSL SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG Session Resume Ciphersuite Do...
69561 IBM WebSphere MQ Internet Pass-Thru TLS Renegotiation Handshake MiTM Plaintex...
69265 OpenSSL TLS Server ssl/t1_lib.c Extension Parsing Race Condition Overflow
69032 Oracle Java SE / Java for Business TLS Renegotiation Handshake MiTM Plaintext...

ExploitDB Exploits

id Description
32998 Heartbleed OpenSSL - Information Leak Exploit (2) - DTLS Support
32791 Heartbleed OpenSSL - Information Leak Exploit (1)
32764 OpenSSL 1.0.1f TLS Heartbeat Extension - Memory Disclosure (Multiple SSL/TLS ...
32745 OpenSSL TLS Heartbeat Extension - Memory Disclosure
28726 OpenSSL SSLv2 Null Pointer Dereference Client Denial of Service Vulnerability
18756 OpenSSL ASN1 BIO Memory Corruption Vulnerability
12334 OpenSSL remote DoS
10579 TLS Renegotiation Vulnerability PoC Exploit
8873 OpenSSL < 0.9.8i DTLS ChangeCipherSpec Remote DoS Exploit
8720 OpenSSL <= 0.9.8k, 1.0.0-beta2 DTLS Remote Memory Exhaustion DoS
4773 OpenSSL < 0.9.7l / 0.9.8d - SSLv2 Client Crash Exploit

OpenVAS Exploits

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
2014-10-16 Name : POODLE SSLv3 Protocol CBC ciphers Information Disclosure Vulnerability
File : nvt/gb_poodel_sslv3_info_disc_vuln.nasl
2012-08-31 Name : VMSA-2012-0013 VMware vSphere and vCOps updates to third party libraries.
File : nvt/gb_VMSA-2012-0013.nasl
2012-08-30 Name : Fedora Update for openssl FEDORA-2012-4630
File : nvt/gb_fedora_2012_4630_openssl_fc17.nasl
2012-08-30 Name : Fedora Update for openssl FEDORA-2012-6343
File : nvt/gb_fedora_2012_6343_openssl_fc17.nasl
2012-08-30 Name : Fedora Update for openssl FEDORA-2012-7939
File : nvt/gb_fedora_2012_7939_openssl_fc17.nasl
2012-08-10 Name : FreeBSD Ports: FreeBSD
File : nvt/freebsd_FreeBSD19.nasl
2012-08-10 Name : Gentoo Security Advisory GLSA 201206-18 (GnuTLS)
File : nvt/glsa_201206_18.nasl
2012-08-03 Name : Mandriva Update for openssl MDVSA-2012:007 (openssl)
File : nvt/gb_mandriva_MDVSA_2012_007.nasl
2012-08-03 Name : Mandriva Update for openssl MDVSA-2012:038 (openssl)
File : nvt/gb_mandriva_MDVSA_2012_038.nasl
2012-08-03 Name : Mandriva Update for openssl MDVSA-2012:060 (openssl)
File : nvt/gb_mandriva_MDVSA_2012_060.nasl
2012-08-03 Name : Mandriva Update for openssl0.9.8 MDVSA-2012:064 (openssl0.9.8)
File : nvt/gb_mandriva_MDVSA_2012_064.nasl
2012-08-03 Name : Mandriva Update for openssl MDVSA-2012:073 (openssl)
File : nvt/gb_mandriva_MDVSA_2012_073.nasl
2012-08-02 Name : SuSE Update for openssl openSUSE-SU-2012:0083-1 (openssl)
File : nvt/gb_suse_2012_0083_1.nasl
2012-07-30 Name : CentOS Update for openssl CESA-2010:0977 centos4 x86_64
File : nvt/gb_CESA-2010_0977_openssl_centos4_x86_64.nasl
2012-07-30 Name : CentOS Update for openssl CESA-2012:0059 centos6
File : nvt/gb_CESA-2012_0059_openssl_centos6.nasl
2012-07-30 Name : CentOS Update for openssl CESA-2012:0060 centos5
File : nvt/gb_CESA-2012_0060_openssl_centos5.nasl
2012-07-30 Name : CentOS Update for openssl CESA-2012:0086 centos4
File : nvt/gb_CESA-2012_0086_openssl_centos4.nasl
2012-07-30 Name : CentOS Update for openssl CESA-2012:0426 centos5
File : nvt/gb_CESA-2012_0426_openssl_centos5.nasl
2012-07-30 Name : CentOS Update for openssl CESA-2012:0426 centos6
File : nvt/gb_CESA-2012_0426_openssl_centos6.nasl
2012-07-30 Name : CentOS Update for openssl097a CESA-2012:0518 centos5
File : nvt/gb_CESA-2012_0518_openssl097a_centos5.nasl
2012-07-30 Name : CentOS Update for openssl098e CESA-2012:0518 centos6
File : nvt/gb_CESA-2012_0518_openssl098e_centos6.nasl
2012-07-30 Name : CentOS Update for openssl CESA-2012:0699 centos5
File : nvt/gb_CESA-2012_0699_openssl_centos5.nasl
2012-07-30 Name : CentOS Update for openssl CESA-2012:0699 centos6
File : nvt/gb_CESA-2012_0699_openssl_centos6.nasl
2012-07-09 Name : RedHat Update for openssl RHSA-2011:1409-01
File : nvt/gb_RHSA-2011_1409-01_openssl.nasl
2012-07-09 Name : RedHat Update for openssl RHSA-2012:0059-01
File : nvt/gb_RHSA-2012_0059-01_openssl.nasl

Information Assurance Vulnerability Management (IAVM)

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
2015-A-0222 Multiple Security Vulnerabilities in Apple iOS
Severity: Category I - VMSKEY: V0061471
2015-B-0106 Multiple Vulnerabilities in HP Version Control Repository Manager
Severity: Category I - VMSKEY: V0061359
2015-A-0203 Multiple Cisco Products Certificate Forgery Vulnerability
Severity: Category I - VMSKEY: V0061345
2015-A-0199 Multiple Vulnerabilities in Apple Mac OS X
Severity: Category I - VMSKEY: V0061337
2015-A-0160 Multiple Vulnerabilities in Oracle Linux and Virtualization
Severity: Category I - VMSKEY: V0061123
2015-A-0158 Multiple Vulnerabilities in Oracle Java SE
Severity: Category I - VMSKEY: V0061089
2015-A-0154 Multiple Vulnerabilities in Oracle Fusion Middleware
Severity: Category I - VMSKEY: V0061081
2015-A-0144 OpenSSL Certificate Validation Vulnerability
Severity: Category I - VMSKEY: V0061067
2015-A-0135 Multiple Vulnerabilities in Blue Coat ProxySG
Severity: Category I - VMSKEY: V0060997
2015-A-0113 Multiple Vulnerabilities in Juniper Networks CTPOS
Severity: Category I - VMSKEY: V0060737
2015-B-0012 Multiple Vulnerabilities in VMware ESXi 5.0
Severity: Category I - VMSKEY: V0058517
2015-B-0013 Multiple Vulnerabilities in VMware ESXi 5.1
Severity: Category I - VMSKEY: V0058515
2015-B-0014 Multiple Vulnerabilities in VMware ESXi 5.5
Severity: Category I - VMSKEY: V0058513
2015-B-0007 Multiple Vulnerabilities in Juniper Secure Analytics (JSA) and Security Threa...
Severity: Category I - VMSKEY: V0058213
2014-A-0172 Multiple Vulnerabilities in Red Hat JBoss Enterprise Application Platform
Severity: Category I - VMSKEY: V0057381
2014-B-0102 Multiple Vulnerabilities in VMware vCenter Converter Standalone 5.5
Severity: Category I - VMSKEY: V0053507
2014-A-0115 Multiple Vulnerabilities in VMware Horizon View
Severity: Category I - VMSKEY: V0053501
2014-B-0101 Multiple Vulnerabilities in VMware vCenter Converter Standalone 5.1
Severity: Category I - VMSKEY: V0053505
2014-B-0103 Multiple Vulnerabilities in VMware Horizon View Client
Severity: Category I - VMSKEY: V0053509
2014-B-0097 Multiple Vulnerabilities in VMware ESXi 5.0
Severity: Category I - VMSKEY: V0053319
2014-A-0111 Multiple Vulnerabilities in VMware Workstation
Severity: Category I - VMSKEY: V0053179
2014-B-0095 Multiple Vulnerabilities in Splunk
Severity: Category I - VMSKEY: V0053177
2014-A-0110 Multiple Vulnerabilities in VMware Player
Severity: Category I - VMSKEY: V0053181
2014-A-0109 Multiple Vulnerabilities in VMware Fusion
Severity: Category I - VMSKEY: V0053183
2014-A-0103 Multiple Vulnerabilities in Oracle E-Business
Severity: Category I - VMSKEY: V0053195

Snort® IPS/IDS

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
Date Description
2014-01-10 SSLv2 openssl get shared ciphers overflow attempt
RuleID : 8440 - Type : IMAP - Revision : 11
2014-01-10 SSLv3 openssl get shared ciphers overflow attempt
RuleID : 8439 - Type : IMAP - Revision : 16
2014-01-10 SSLv2 openssl get shared ciphers overflow attempt
RuleID : 8438 - Type : IMAP - Revision : 16
2014-01-10 SSLv2 openssl get shared ciphers overflow attempt
RuleID : 8437 - Type : SMTP - Revision : 15
2014-01-10 SSLv2 openssl get shared ciphers overflow attempt
RuleID : 8436 - Type : SMTP - Revision : 14
2014-01-10 SSLv3 openssl get shared ciphers overflow attempt
RuleID : 8435 - Type : SMTP - Revision : 16
2014-01-10 SSLv3 openssl get shared ciphers overflow attempt
RuleID : 8434 - Type : SMTP - Revision : 16
2014-01-10 SSLv2 openssl get shared ciphers overflow attempt
RuleID : 8433 - Type : SMTP - Revision : 15
2014-01-10 SSLv2 openssl get shared ciphers overflow attempt
RuleID : 8432 - Type : SMTP - Revision : 15
2014-01-10 SSLv2 openssl get shared ciphers overflow attempt
RuleID : 8431 - Type : POP3 - Revision : 14
2014-01-10 SSLv3 openssl get shared ciphers overflow attempt
RuleID : 8430 - Type : POP3 - Revision : 15
2014-01-10 SSLv2 openssl get shared ciphers overflow attempt
RuleID : 8429 - Type : POP3 - Revision : 14
2014-01-10 SSLv2 openssl get shared ciphers overflow attempt
RuleID : 8428 - Type : SERVER-OTHER - Revision : 21
2014-01-10 SSLv2 openssl get shared ciphers overflow attempt
RuleID : 8427 - Type : MISC - Revision : 18
2014-01-10 SSLv3 openssl get shared ciphers overflow attempt
RuleID : 8426 - Type : SERVER-OTHER - Revision : 20
2020-02-25 OpenSSL anonymous ECDH denial of service attempt
RuleID : 52626 - Type : SERVER-OTHER - Revision : 1
2020-02-25 OpenSSL anonymous ECDH denial of service attempt
RuleID : 52625 - Type : SERVER-OTHER - Revision : 1
2020-01-21 OpenSSL SSL ChangeCipherSpec man-in-the-middle attempt
RuleID : 52487 - Type : SERVER-OTHER - Revision : 1
2019-12-03 OpenSSL ECDH malformed Client Hello denial of service attempt
RuleID : 52042 - Type : SERVER-OTHER - Revision : 1
2019-10-10 OpenSSL DTLS SRTP extension parsing denial-of-service attempt
RuleID : 51460 - Type : SERVER-OTHER - Revision : 1
2019-10-01 OpenSSL DTLS duplicate record denial of service attempt
RuleID : 51359 - Type : SERVER-OTHER - Revision : 1
2019-10-01 OpenSSL DTLS duplicate record denial of service attempt
RuleID : 51358 - Type : SERVER-OTHER - Revision : 1
2019-10-01 OpenSSL DTLS duplicate record denial of service attempt
RuleID : 51357 - Type : SERVER-OTHER - Revision : 1
2019-10-01 OpenSSL DTLS duplicate record denial of service attempt
RuleID : 51356 - Type : SERVER-OTHER - Revision : 1
2019-10-01 OpenSSL TLS anomalous ascii client session ticket
RuleID : 51354 - Type : SERVER-OTHER - Revision : 1

Nessus® Vulnerability Scanner

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
2019-01-18 Name: The remote Fedora host is missing a security update.
File: fedora_2019-a8ffcff7ee.nasl - Type: ACT_GATHER_INFO
2019-01-17 Name: The remote database server is affected by multiple vulnerabilities.
File: mysql_5_6_43.nasl - Type: ACT_GATHER_INFO
2019-01-17 Name: The remote database server is affected by multiple vulnerabilities.
File: mysql_5_7_25.nasl - Type: ACT_GATHER_INFO
2019-01-17 Name: The remote database server is affected by multiple vulnerabilities.
File: mysql_8_0_14.nasl - Type: ACT_GATHER_INFO
2019-01-11 Name: The remote device is missing a vendor-supplied security patch.
File: juniper_jsa10919.nasl - Type: ACT_GATHER_INFO
2019-01-08 Name: The remote EulerOS host is missing multiple security updates.
File: EulerOS_SA-2019-1009.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-2f696a3be3.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-49651b2236.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-520e4c5b4e.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-9d667bdff8.nasl - Type: ACT_GATHER_INFO
2019-01-02 Name: Tenable Nessus running on the remote host is affected by multiple vulnerabili...
File: nessus_tns_2018_16.nasl - Type: ACT_GATHER_INFO
2019-01-02 Name: Tenable Nessus running on the remote host is affected by multiple vulnerabili...
File: nessus_tns_2018_17.nasl - Type: ACT_GATHER_INFO
2018-12-28 Name: The remote EulerOS host is missing multiple security updates.
File: EulerOS_SA-2018-1420.nasl - Type: ACT_GATHER_INFO
2018-12-28 Name: The remote EulerOS host is missing a security update.
File: EulerOS_SA-2018-1434.nasl - Type: ACT_GATHER_INFO
2018-12-28 Name: Node.js - JavaScript run-time environment is affected by multiple vulnerabili...
File: nodejs_2018_nov.nasl - Type: ACT_GATHER_INFO
2018-12-21 Name: An infrastructure management application running on the remote host is affect...
File: ibm_tem_9_5_10.nasl - Type: ACT_GATHER_INFO
2018-12-20 Name: The remote Debian host is missing a security-related update.
File: debian_DSA-4355.nasl - Type: ACT_GATHER_INFO
2018-12-10 Name: The remote EulerOS host is missing multiple security updates.
File: EulerOS_SA-2018-1392.nasl - Type: ACT_GATHER_INFO
2018-12-10 Name: The remote FreeBSD host is missing one or more security-related updates.
File: freebsd_pkg_2a86f45afc3c11e8a41400155d006b02.nasl - Type: ACT_GATHER_INFO
2018-12-07 Name: The remote Amazon Linux AMI host is missing a security update.
File: ala_ALAS-2018-1102.nasl - Type: ACT_GATHER_INFO
2018-12-01 Name: The remote Debian host is missing a security-related update.
File: debian_DSA-4348.nasl - Type: ACT_GATHER_INFO
2018-11-29 Name: The remote Gentoo host is missing one or more security-related patches.
File: gentoo_GLSA-201811-21.nasl - Type: ACT_GATHER_INFO
2018-11-23 Name: The remote Slackware host is missing a security update.
File: Slackware_SSA_2018-325-01.nasl - Type: ACT_GATHER_INFO
2018-11-23 Name: The remote Debian host is missing a security update.
File: debian_DLA-1586.nasl - Type: ACT_GATHER_INFO
2018-11-21 Name: The remote EulerOS Virtualization host is missing a security update.
File: EulerOS_SA-2018-1379.nasl - Type: ACT_GATHER_INFO