Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2011-4619

Опубликовано: 06 янв. 2012
Источник: debian
EPSS Низкий

Описание

The Server Gated Cryptography (SGC) implementation in OpenSSL before 0.9.8s and 1.x before 1.0.0f does not properly handle handshake restarts, which allows remote attackers to cause a denial of service (CPU consumption) via unspecified vectors.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
opensslfixed1.0.0h-1package

EPSS

Процентиль: 91%
0.07022
Низкий

Связанные уязвимости

ubuntu
больше 13 лет назад

The Server Gated Cryptography (SGC) implementation in OpenSSL before 0.9.8s and 1.x before 1.0.0f does not properly handle handshake restarts, which allows remote attackers to cause a denial of service (CPU consumption) via unspecified vectors.

redhat
больше 13 лет назад

The Server Gated Cryptography (SGC) implementation in OpenSSL before 0.9.8s and 1.x before 1.0.0f does not properly handle handshake restarts, which allows remote attackers to cause a denial of service (CPU consumption) via unspecified vectors.

nvd
больше 13 лет назад

The Server Gated Cryptography (SGC) implementation in OpenSSL before 0.9.8s and 1.x before 1.0.0f does not properly handle handshake restarts, which allows remote attackers to cause a denial of service (CPU consumption) via unspecified vectors.

github
больше 3 лет назад

The Server Gated Cryptography (SGC) implementation in OpenSSL before 0.9.8s and 1.x before 1.0.0f does not properly handle handshake restarts, which allows remote attackers to cause a denial of service (CPU consumption) via unspecified vectors.

oracle-oval
больше 13 лет назад

ELSA-2012-0060: openssl security update (MODERATE)

EPSS

Процентиль: 91%
0.07022
Низкий