Lucene search

K

Openssl Security Vulnerabilities

cve
cve

CVE-2020-9433

openssl_x509_check_email in lua-openssl 0.7.7-1 mishandles X.509 certificate validation because it uses lua_pushboolean for certain non-boolean return...

9.1CVSS

7.4AI Score

0.001EPSS

2020-02-27 11:15 PM
56
cve
cve

CVE-2020-9432

openssl_x509_check_host in lua-openssl 0.7.7-1 mishandles X.509 certificate validation because it uses lua_pushboolean for certain non-boolean return...

9.1CVSS

7.4AI Score

0.001EPSS

2020-02-27 11:15 PM
51
cve
cve

CVE-2019-1551

There is an overflow bug in the x64_64 Montgomery squaring procedure used in exponentiation with 512-bit moduli. No EC algorithms are affected. Analysis suggests that attacks against 2-prime RSA1024, 3-prime RSA1536, and DSA1024 as a result of this defect would be very difficult to perform and are....

5.3CVSS

5.6AI Score

0.002EPSS

2019-12-06 06:15 PM
448
5
cve
cve

CVE-2011-4121

The OpenSSL extension of Ruby (Git trunk) versions after 2011-09-01 up to 2011-11-03 always generated an exponent value of '1' to be used for private RSA key generation. A remote attacker could use this flaw to bypass or corrupt integrity of services, depending on strong private RSA keys...

9.8CVSS

9.3AI Score

0.013EPSS

2019-11-26 05:15 AM
64
cve
cve

CVE-2019-1547

Normally in OpenSSL EC groups always have a co-factor present and this is used in side channel resistant code paths. However, in some cases, it is possible to construct a group using explicit parameters (instead of using a named curve). In those cases it is possible that such a group does not have....

4.7CVSS

5.4AI Score

0.001EPSS

2019-09-10 05:15 PM
327
10
cve
cve

CVE-2019-1549

OpenSSL 1.1.1 introduced a rewritten random number generator (RNG). This was intended to include protection in the event of a fork() system call in order to ensure that the parent and child processes did not share the same RNG state. However this protection was not being used in the default case......

5.3CVSS

5.1AI Score

0.011EPSS

2019-09-10 05:15 PM
315
2
cve
cve

CVE-2019-1563

In situations where an attacker receives automated notification of the success or failure of a decryption attempt an attacker, after sending a very large number of messages to be decrypted, can recover a CMS/PKCS7 transported encryption key or decrypt any RSA encrypted message that was encrypted...

3.7CVSS

5.2AI Score

0.015EPSS

2019-09-10 05:15 PM
308
7
cve
cve

CVE-2018-20997

An issue was discovered in the openssl crate before 0.10.9 for Rust. A use-after-free occurs in CMS...

9.8CVSS

9.4AI Score

0.002EPSS

2019-08-26 06:15 PM
37
2
cve
cve

CVE-2016-10931

An issue was discovered in the openssl crate before 0.9.0 for Rust. There is an SSL/TLS man-in-the-middle vulnerability because certificate verification is off by default and there is no API for hostname...

8.1CVSS

7.9AI Score

0.001EPSS

2019-08-26 12:15 PM
33
2
cve
cve

CVE-2019-1552

OpenSSL has internal defaults for a directory tree where it can find a configuration file as well as certificates used for verification in TLS. This directory is most commonly referred to as OPENSSLDIR, and is configurable with the --prefix / --openssldir configuration options. For OpenSSL...

3.3CVSS

4.4AI Score

0.001EPSS

2019-07-30 05:15 PM
225
6
cve
cve

CVE-2019-1543

ChaCha20-Poly1305 is an AEAD cipher, and requires a unique nonce input for every encryption operation. RFC 7539 specifies that the nonce value (IV) should be 96 bits (12 bytes). OpenSSL allows a variable nonce length and front pads the nonce with 0 bytes if it is less than 12 bytes. However it...

7.4CVSS

7.1AI Score

0.025EPSS

2019-03-06 09:29 PM
390
12
cve
cve

CVE-2019-1559

If an application encounters a fatal protocol error and then calls SSL_shutdown() twice (once to send a close_notify, and once to receive one) then OpenSSL can respond differently to the calling application if a 0 byte record is received with invalid padding compared to if a 0 byte record is...

5.9CVSS

6.1AI Score

0.01EPSS

2019-02-27 11:29 PM
551
2
cve
cve

CVE-2018-16395

An issue was discovered in the OpenSSL library in Ruby before 2.3.8, 2.4.x before 2.4.5, 2.5.x before 2.5.2, and 2.6.x before 2.6.0-preview3. When two OpenSSL::X509::Name objects are compared using ==, depending on the ordering, non-equal objects may return true. When the first argument is one...

9.8CVSS

9.1AI Score

0.007EPSS

2018-11-16 06:29 PM
378
cve
cve

CVE-2018-0734

The OpenSSL DSA signature algorithm has been shown to be vulnerable to a timing side channel attack. An attacker could use variations in the signing algorithm to recover the private key. Fixed in OpenSSL 1.1.1a (Affected 1.1.1). Fixed in OpenSSL 1.1.0j (Affected 1.1.0-1.1.0i). Fixed in OpenSSL...

5.9CVSS

6AI Score

0.003EPSS

2018-10-30 12:29 PM
359
2
cve
cve

CVE-2018-0735

The OpenSSL ECDSA signature algorithm has been shown to be vulnerable to a timing side channel attack. An attacker could use variations in the signing algorithm to recover the private key. Fixed in OpenSSL 1.1.0j (Affected 1.1.0-1.1.0i). Fixed in OpenSSL 1.1.1a (Affected...

5.9CVSS

5.6AI Score

0.006EPSS

2018-10-29 01:29 PM
259
2
cve
cve

CVE-2016-7056

A timing attack flaw was found in OpenSSL 1.0.1u and before that could allow a malicious user with local access to recover ECDSA P-256 private...

5.5CVSS

5.8AI Score

0.0004EPSS

2018-09-10 04:29 PM
184
8
cve
cve

CVE-2018-0732

During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will cause the client to spend an unreasonably long period of time generating a key for this prime resulting in a hang until the client has finished....

7.5CVSS

7.5AI Score

0.05EPSS

2018-06-12 01:29 PM
312
3
cve
cve

CVE-2017-16064

node-openssl was a malicious module published with the intent to hijack environment variables. It has been unpublished by...

7.5CVSS

7.4AI Score

0.002EPSS

2018-06-07 02:29 AM
34
cve
cve

CVE-2018-0737

The OpenSSL RSA Key generation algorithm has been shown to be vulnerable to a cache timing side channel attack. An attacker with sufficient access to mount cache timing attacks during the RSA key generation process could recover the private key. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h).....

5.9CVSS

6.6AI Score

0.01EPSS

2018-04-16 06:29 PM
313
cve
cve

CVE-2018-0733

Because of an implementation bug the PA-RISC CRYPTO_memcmp function is effectively reduced to only comparing the least significant bit of each byte. This allows an attacker to forge messages that would be considered as authenticated in an amount of tries lower than that guaranteed by the security.....

5.9CVSS

5.9AI Score

0.015EPSS

2018-03-27 09:29 PM
97
cve
cve

CVE-2018-0739

Constructed ASN.1 types with a recursive definition (such as can be found in PKCS7) could eventually exceed the stack given malicious input with excessive recursion. This could result in a Denial Of Service attack. There are no such structures used within SSL/TLS that come from untrusted sources...

6.5CVSS

6.5AI Score

0.008EPSS

2018-03-27 09:29 PM
247
4
cve
cve

CVE-2016-8516

A remote denial of service vulnerability in HPE Systems Insight Manager in all versions prior to 7.6 was...

7.5CVSS

7.4AI Score

0.007EPSS

2018-02-15 10:29 PM
23
cve
cve

CVE-2016-8517

A cross site scripting vulnerability in HPE Systems Insight Manager in all versions prior to 7.6 was...

6.1CVSS

6.5AI Score

0.003EPSS

2018-02-15 10:29 PM
21
cve
cve

CVE-2016-8518

A remote denial of service vulnerability in HPE Systems Insight Manager in all versions prior to 7.6 was...

7.5CVSS

7.4AI Score

0.007EPSS

2018-02-15 10:29 PM
19
cve
cve

CVE-2017-3737

OpenSSL 1.0.2 (starting from version 1.0.2b) introduced an "error state" mechanism. The intent was that if a fatal error occurred during a handshake then OpenSSL would move into the error state and would immediately fail if you attempted to continue the handshake. This works as designed for the...

5.9CVSS

6.3AI Score

0.946EPSS

2017-12-07 04:29 PM
303
cve
cve

CVE-2017-3738

There is an overflow bug in the AVX2 Montgomery multiplication procedure used in exponentiation with 1024-bit moduli. No EC algorithms are affected. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely. Attacks....

5.9CVSS

6.3AI Score

0.008EPSS

2017-12-07 04:29 PM
295
cve
cve

CVE-2016-8610

A denial of service flaw was found in OpenSSL 0.9.8, 1.0.1, 1.0.2 through 1.0.2h, and 1.1.0 in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL server consume an excessive amount of CPU and fail.....

7.5CVSS

7.4AI Score

0.202EPSS

2017-11-13 10:29 PM
180
cve
cve

CVE-2017-3736

There is a carry propagating bug in the x86_64 Montgomery squaring procedure in OpenSSL before 1.0.2m and 1.1.0 before 1.1.0g. No EC algorithms are affected. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed...

6.5CVSS

7.4AI Score

0.002EPSS

2017-11-02 05:29 PM
267
2
cve
cve

CVE-2017-3735

While parsing an IPAddressFamily extension in an X.509 certificate, it is possible to do a one-byte overread. This would result in an incorrect text display of the certificate. This bug has been present since 2006 and is present in all versions of OpenSSL before 1.0.2m and...

5.3CVSS

6.1AI Score

0.028EPSS

2017-08-28 07:29 PM
388
cve
cve

CVE-2016-7055

There is a carry propagating bug in the Broadwell-specific Montgomery multiplication procedure in OpenSSL 1.0.2 and 1.1.0 before 1.1.0c that handles input lengths divisible by, but longer than 256 bits. Analysis suggests that attacks against RSA, DSA and DH private keys are impossible. This is...

5.9CVSS

6.7AI Score

0.008EPSS

2017-05-04 08:29 PM
153
2
cve
cve

CVE-2016-7054

In OpenSSL 1.1.0 before 1.1.0c, TLS connections using *-CHACHA20-POLY1305 ciphersuites are susceptible to a DoS attack by corrupting larger payloads. This can result in an OpenSSL crash. This issue is not considered to be exploitable beyond a...

7.5CVSS

7.1AI Score

0.899EPSS

2017-05-04 07:29 PM
49
5
cve
cve

CVE-2017-3731

If an SSL/TLS server or client is running on a 32-bit host, and a specific cipher is being used, then a truncated packet can cause that server or client to perform an out-of-bounds read, usually resulting in a crash. For OpenSSL 1.1.0, the crash can be triggered when using CHACHA20/POLY1305; users....

7.5CVSS

7.6AI Score

0.046EPSS

2017-05-04 07:29 PM
195
5
cve
cve

CVE-2017-3732

There is a carry propagating bug in the x86_64 Montgomery squaring procedure in OpenSSL 1.0.2 before 1.0.2k and 1.1.0 before 1.1.0d. No EC algorithms are affected. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed.....

5.9CVSS

7.5AI Score

0.005EPSS

2017-05-04 07:29 PM
109
4
cve
cve

CVE-2017-3730

In OpenSSL 1.1.0 before 1.1.0d, if a malicious server supplies bad parameters for a DHE or ECDHE key exchange then this can result in the client attempting to dereference a NULL pointer leading to a client crash. This could be exploited in a Denial of Service...

7.5CVSS

7.2AI Score

0.954EPSS

2017-05-04 07:29 PM
62
4
cve
cve

CVE-2017-3733

During a renegotiation handshake if the Encrypt-Then-Mac extension is negotiated where it was not in the original handshake (or vice-versa) then this can cause OpenSSL 1.1.0 before 1.1.0e to crash (dependent on ciphersuite). Both clients and servers are...

7.5CVSS

7.1AI Score

0.036EPSS

2017-05-04 07:29 PM
46
2
cve
cve

CVE-2016-7053

In OpenSSL 1.1.0 before 1.1.0c, applications parsing invalid CMS structures can crash with a NULL pointer dereference. This is caused by a bug in the handling of the ASN.1 CHOICE type in OpenSSL 1.1.0 which can result in a NULL value being passed to the structure callback if an attempt is made to.....

7.5CVSS

7.2AI Score

0.739EPSS

2017-05-04 07:29 PM
34
4
cve
cve

CVE-2016-7798

The openssl gem for Ruby uses the same initialization vector (IV) in GCM Mode (aes-*-gcm) when the IV is set before the key, which makes it easier for context-dependent attackers to bypass the encryption protection...

7.5CVSS

7.3AI Score

0.004EPSS

2017-01-30 10:59 PM
102
cve
cve

CVE-2016-6305

The ssl3_read_bytes function in record/rec_layer_s3.c in OpenSSL 1.1.0 before 1.1.0a allows remote attackers to cause a denial of service (infinite loop) by triggering a zero-length record in an SSL_peek...

7.5CVSS

8.1AI Score

0.573EPSS

2016-09-26 07:59 PM
49
cve
cve

CVE-2016-6307

The state-machine implementation in OpenSSL 1.1.0 before 1.1.0a allocates memory before checking for an excessive length, which might allow remote attackers to cause a denial of service (memory consumption) via crafted TLS messages, related to statem/statem.c and...

5.9CVSS

7AI Score

0.61EPSS

2016-09-26 07:59 PM
60
4
cve
cve

CVE-2016-6308

statem/statem_dtls.c in the DTLS implementation in OpenSSL 1.1.0 before 1.1.0a allocates memory before checking for an excessive length, which might allow remote attackers to cause a denial of service (memory consumption) via crafted DTLS...

5.9CVSS

6.9AI Score

0.624EPSS

2016-09-26 07:59 PM
52
4
cve
cve

CVE-2016-6306

The certificate parser in OpenSSL before 1.0.1u and 1.0.2 before 1.0.2i might allow remote attackers to cause a denial of service (out-of-bounds read) via crafted certificate operations, related to s3_clnt.c and...

5.9CVSS

7.5AI Score

0.193EPSS

2016-09-26 07:59 PM
175
4
cve
cve

CVE-2016-6309

statem/statem.c in OpenSSL 1.1.0a does not consider memory-block movement after a realloc call, which allows remote attackers to cause a denial of service (use-after-free) or possibly execute arbitrary code via a crafted TLS...

9.8CVSS

9.5AI Score

0.911EPSS

2016-09-26 07:59 PM
81
5
cve
cve

CVE-2016-7052

crypto/x509/x509_vfy.c in OpenSSL 1.0.2i allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) by triggering a CRL...

7.5CVSS

8.1AI Score

0.427EPSS

2016-09-26 07:59 PM
67
4
cve
cve

CVE-2016-6304

Multiple memory leaks in t1_lib.c in OpenSSL before 1.0.1u, 1.0.2 before 1.0.2i, and 1.1.0 before 1.1.0a allow remote attackers to cause a denial of service (memory consumption) via large OCSP Status Request...

7.5CVSS

8AI Score

0.566EPSS

2016-09-26 07:59 PM
211
cve
cve

CVE-2016-6302

The tls_decrypt_ticket function in ssl/t1_lib.c in OpenSSL before 1.1.0 does not consider the HMAC size during validation of the ticket length, which allows remote attackers to cause a denial of service via a ticket that is too...

7.5CVSS

7.4AI Score

0.307EPSS

2016-09-16 05:59 AM
153
2
cve
cve

CVE-2016-2181

The Anti-Replay feature in the DTLS implementation in OpenSSL before 1.1.0 mishandles early use of a new epoch number in conjunction with a large sequence number, which allows remote attackers to cause a denial of service (false-positive packet drops) via spoofed DTLS records, related to...

7.5CVSS

8.4AI Score

0.605EPSS

2016-09-16 05:59 AM
174
cve
cve

CVE-2016-6303

Integer overflow in the MDC2_Update function in crypto/mdc2/mdc2dgst.c in OpenSSL before 1.1.0 allows remote attackers to cause a denial of service (out-of-bounds write and application crash) or possibly have unspecified other impact via unknown...

9.8CVSS

8.7AI Score

0.289EPSS

2016-09-16 05:59 AM
230
4
cve
cve

CVE-2016-2179

The DTLS implementation in OpenSSL before 1.1.0 does not properly restrict the lifetime of queue entries associated with unused out-of-order messages, which allows remote attackers to cause a denial of service (memory consumption) by maintaining many crafted DTLS sessions simultaneously, related...

7.5CVSS

8.3AI Score

0.421EPSS

2016-09-16 05:59 AM
149
cve
cve

CVE-2016-2182

The BN_bn2dec function in crypto/bn/bn_print.c in OpenSSL before 1.1.0 does not properly validate division results, which allows remote attackers to cause a denial of service (out-of-bounds write and application crash) or possibly have unspecified other impact via unknown...

9.8CVSS

9.2AI Score

0.536EPSS

2016-09-16 05:59 AM
218
cve
cve

CVE-2016-2183

The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and other protocols and products, have a birthday bound of approximately four billion blocks, which makes it easier for remote attackers to obtain cleartext data via a birthday attack against a long-duration encrypted...

7.5CVSS

7.3AI Score

0.005EPSS

2016-09-01 12:59 AM
978
In Wild
7
Total number of security vulnerabilities262