Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2012-2131

Опубликовано: 24 апр. 2012
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 7.5

Описание

Multiple integer signedness errors in crypto/buffer/buffer.c in OpenSSL 0.9.8v allow remote attackers to conduct buffer overflow attacks, and cause a denial of service (memory corruption) or possibly have unspecified other impact, via crafted DER data, as demonstrated by an X.509 certificate or an RSA public key. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-2110.

РелизСтатусПримечание
devel

not-affected

1.0.1-4ubuntu3
hardy

released

0.9.8g-4ubuntu3.18
lucid

released

0.9.8k-7ubuntu8.11
natty

released

0.9.8o-5ubuntu1.5
oneiric

not-affected

1.0.0e-2ubuntu4.4
upstream

released

0.9.8w

Показывать по

РелизСтатусПримечание
devel

released

0.9.8o-7ubuntu3.1
hardy

DNE

lucid

DNE

natty

DNE

oneiric

released

0.9.8o-7ubuntu1.2
upstream

released

0.9.8w

Показывать по

EPSS

Процентиль: 92%
0.07418
Низкий

7.5 High

CVSS2

Связанные уязвимости

redhat
почти 14 лет назад

Multiple integer signedness errors in crypto/buffer/buffer.c in OpenSSL 0.9.8v allow remote attackers to conduct buffer overflow attacks, and cause a denial of service (memory corruption) or possibly have unspecified other impact, via crafted DER data, as demonstrated by an X.509 certificate or an RSA public key. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-2110.

nvd
почти 14 лет назад

Multiple integer signedness errors in crypto/buffer/buffer.c in OpenSSL 0.9.8v allow remote attackers to conduct buffer overflow attacks, and cause a denial of service (memory corruption) or possibly have unspecified other impact, via crafted DER data, as demonstrated by an X.509 certificate or an RSA public key. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-2110.

debian
почти 14 лет назад

Multiple integer signedness errors in crypto/buffer/buffer.c in OpenSS ...

github
больше 3 лет назад

Multiple integer signedness errors in crypto/buffer/buffer.c in OpenSSL 0.9.8v allow remote attackers to conduct buffer overflow attacks, and cause a denial of service (memory corruption) or possibly have unspecified other impact, via crafted DER data, as demonstrated by an X.509 certificate or an RSA public key. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-2110.

EPSS

Процентиль: 92%
0.07418
Низкий

7.5 High

CVSS2