Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2010-1633

Опубликовано: 03 июн. 2010
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 6.4

Описание

RSA verification recovery in the EVP_PKEY_verify_recover function in OpenSSL 1.x before 1.0.0a, as used by pkeyutl and possibly other applications, returns uninitialized memory upon failure, which might allow context-dependent attackers to bypass intended key requirements or obtain sensitive information via unspecified vectors. NOTE: some of these details are obtained from third party information.

РелизСтатусПримечание
dapper

not-affected

devel

not-affected

0.9.8k-7ubuntu8
hardy

not-affected

jaunty

not-affected

karmic

not-affected

lucid

not-affected

upstream

released

1.0.0a

Показывать по

EPSS

Процентиль: 65%
0.00501
Низкий

6.4 Medium

CVSS2

Связанные уязвимости

redhat
больше 15 лет назад

RSA verification recovery in the EVP_PKEY_verify_recover function in OpenSSL 1.x before 1.0.0a, as used by pkeyutl and possibly other applications, returns uninitialized memory upon failure, which might allow context-dependent attackers to bypass intended key requirements or obtain sensitive information via unspecified vectors. NOTE: some of these details are obtained from third party information.

nvd
больше 15 лет назад

RSA verification recovery in the EVP_PKEY_verify_recover function in OpenSSL 1.x before 1.0.0a, as used by pkeyutl and possibly other applications, returns uninitialized memory upon failure, which might allow context-dependent attackers to bypass intended key requirements or obtain sensitive information via unspecified vectors. NOTE: some of these details are obtained from third party information.

debian
больше 15 лет назад

RSA verification recovery in the EVP_PKEY_verify_recover function in O ...

github
больше 3 лет назад

RSA verification recovery in the EVP_PKEY_verify_recover function in OpenSSL 1.x before 1.0.0a, as used by pkeyutl and possibly other applications, returns uninitialized memory upon failure, which might allow context-dependent attackers to bypass intended key requirements or obtain sensitive information via unspecified vectors. NOTE: some of these details are obtained from third party information.

CVSS3: 7.3
fstec
около 14 лет назад

Уязвимости операционной системы Gentoo Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации

EPSS

Процентиль: 65%
0.00501
Низкий

6.4 Medium

CVSS2