Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2016-7054

Опубликовано: 04 мая 2017
Источник: debian

Описание

In OpenSSL 1.1.0 before 1.1.0c, TLS connections using *-CHACHA20-POLY1305 ciphersuites are susceptible to a DoS attack by corrupting larger payloads. This can result in an OpenSSL crash. This issue is not considered to be exploitable beyond a DoS.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
opensslfixed1.1.0c-1package
opensslnot-affectedjessiepackage
opensslnot-affectedwheezypackage
openssl1.0not-affectedpackage

Примечания

  • https://www.openssl.org/news/secadv/20161110.txt

Связанные уязвимости

CVSS3: 7.5
ubuntu
почти 9 лет назад

In OpenSSL 1.1.0 before 1.1.0c, TLS connections using *-CHACHA20-POLY1305 ciphersuites are susceptible to a DoS attack by corrupting larger payloads. This can result in an OpenSSL crash. This issue is not considered to be exploitable beyond a DoS.

CVSS3: 7.5
redhat
около 9 лет назад

In OpenSSL 1.1.0 before 1.1.0c, TLS connections using *-CHACHA20-POLY1305 ciphersuites are susceptible to a DoS attack by corrupting larger payloads. This can result in an OpenSSL crash. This issue is not considered to be exploitable beyond a DoS.

CVSS3: 7.5
nvd
почти 9 лет назад

In OpenSSL 1.1.0 before 1.1.0c, TLS connections using *-CHACHA20-POLY1305 ciphersuites are susceptible to a DoS attack by corrupting larger payloads. This can result in an OpenSSL crash. This issue is not considered to be exploitable beyond a DoS.

CVSS3: 7.5
github
больше 3 лет назад

In OpenSSL 1.1.0 before 1.1.0c, TLS connections using *-CHACHA20-POLY1305 ciphersuites are susceptible to a DoS attack by corrupting larger payloads. This can result in an OpenSSL crash. This issue is not considered to be exploitable beyond a DoS.

CVSS3: 7.5
fstec
почти 9 лет назад

Уязвимость реализации алгоритма CHACHA20-POLY1305 библиотеки OpenSSL, связанная с неправильным контролем доступа , позволяющая нарушителю вызвать отказ в обслуживании