Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2012-0518

Опубликовано: 25 апр. 2012
Источник: oracle-oval
Платформа: Oracle Linux 5
Платформа: Oracle Linux 6

Описание

ELSA-2012-0518: openssl security update (IMPORTANT)

openssl: [1.0.0-20.4]

  • fix for CVE-2012-2110 - memory corruption in asn1_d2i_read_bio() (#814185)

openssl098e: [0.9.8e-17.el6_2.2]

  • Updated the description

[0.9.8e-17.2]

  • fix for CVE-2012-2110 - memory corruption in asn1_d2i_read_bio() (#814185)

Обновленные пакеты

Oracle Linux 5

Oracle Linux ia64

openssl

0.9.8e-22.el5_8.3

openssl-devel

0.9.8e-22.el5_8.3

openssl-perl

0.9.8e-22.el5_8.3

openssl097a

0.9.7a-11.el5_8.2

Oracle Linux x86_64

openssl

0.9.8e-22.el5_8.3

openssl-devel

0.9.8e-22.el5_8.3

openssl-perl

0.9.8e-22.el5_8.3

openssl097a

0.9.7a-11.el5_8.2

Oracle Linux i386

openssl

0.9.8e-22.el5_8.3

openssl-devel

0.9.8e-22.el5_8.3

openssl-perl

0.9.8e-22.el5_8.3

openssl097a

0.9.7a-11.el5_8.2

Oracle Linux 6

Oracle Linux x86_64

openssl

1.0.0-20.el6_2.4

openssl-devel

1.0.0-20.el6_2.4

openssl-perl

1.0.0-20.el6_2.4

openssl-static

1.0.0-20.el6_2.4

openssl098e

0.9.8e-17.0.1.el6_2.2

Oracle Linux i686

openssl

1.0.0-20.el6_2.4

openssl-devel

1.0.0-20.el6_2.4

openssl-perl

1.0.0-20.el6_2.4

openssl-static

1.0.0-20.el6_2.4

openssl098e

0.9.8e-17.0.1.el6_2.2

Связанные CVE

Связанные уязвимости

ubuntu
больше 13 лет назад

The asn1_d2i_read_bio function in crypto/asn1/a_d2i_fp.c in OpenSSL before 0.9.8v, 1.0.0 before 1.0.0i, and 1.0.1 before 1.0.1a does not properly interpret integer data, which allows remote attackers to conduct buffer overflow attacks, and cause a denial of service (memory corruption) or possibly have unspecified other impact, via crafted DER data, as demonstrated by an X.509 certificate or an RSA public key.

redhat
больше 13 лет назад

The asn1_d2i_read_bio function in crypto/asn1/a_d2i_fp.c in OpenSSL before 0.9.8v, 1.0.0 before 1.0.0i, and 1.0.1 before 1.0.1a does not properly interpret integer data, which allows remote attackers to conduct buffer overflow attacks, and cause a denial of service (memory corruption) or possibly have unspecified other impact, via crafted DER data, as demonstrated by an X.509 certificate or an RSA public key.

nvd
больше 13 лет назад

The asn1_d2i_read_bio function in crypto/asn1/a_d2i_fp.c in OpenSSL before 0.9.8v, 1.0.0 before 1.0.0i, and 1.0.1 before 1.0.1a does not properly interpret integer data, which allows remote attackers to conduct buffer overflow attacks, and cause a denial of service (memory corruption) or possibly have unspecified other impact, via crafted DER data, as demonstrated by an X.509 certificate or an RSA public key.

debian
больше 13 лет назад

The asn1_d2i_read_bio function in crypto/asn1/a_d2i_fp.c in OpenSSL be ...

github
больше 3 лет назад

The asn1_d2i_read_bio function in crypto/asn1/a_d2i_fp.c in OpenSSL before 0.9.8v, 1.0.0 before 1.0.0i, and 1.0.1 before 1.0.1a does not properly interpret integer data, which allows remote attackers to conduct buffer overflow attacks, and cause a denial of service (memory corruption) or possibly have unspecified other impact, via crafted DER data, as demonstrated by an X.509 certificate or an RSA public key.