Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2014-3508

Опубликовано: 13 авг. 2014
Источник: ubuntu
Приоритет: medium
CVSS2: 4.3

Описание

The OBJ_obj2txt function in crypto/objects/obj_dat.c in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i, when pretty printing is used, does not ensure the presence of '\0' characters, which allows context-dependent attackers to obtain sensitive information from process stack memory by reading output from X509_name_oneline, X509_name_print_ex, and unspecified other functions.

РелизСтатусПримечание
artful

released

1.0.1f-1ubuntu7
bionic

released

1.0.1f-1ubuntu7
cosmic

released

1.0.1f-1ubuntu7
devel

released

1.0.1f-1ubuntu7
disco

released

1.0.1f-1ubuntu7
esm-infra-legacy/trusty

not-affected

1.0.1f-1ubuntu2.5
esm-infra/bionic

not-affected

1.0.1f-1ubuntu7
esm-infra/xenial

not-affected

1.0.1f-1ubuntu7
lucid

released

0.9.8k-7ubuntu8.20
precise

released

1.0.1-4ubuntu5.17

Показывать по

РелизСтатусПримечание
artful

DNE

bionic

DNE

cosmic

DNE

devel

DNE

disco

DNE

esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was needed]
lucid

DNE

precise

ignored

end of life
precise/esm

DNE

precise was needed
trusty

ignored

end of standard support

Показывать по

4.3 Medium

CVSS2

Связанные уязвимости

redhat
почти 11 лет назад

The OBJ_obj2txt function in crypto/objects/obj_dat.c in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i, when pretty printing is used, does not ensure the presence of '\0' characters, which allows context-dependent attackers to obtain sensitive information from process stack memory by reading output from X509_name_oneline, X509_name_print_ex, and unspecified other functions.

nvd
почти 11 лет назад

The OBJ_obj2txt function in crypto/objects/obj_dat.c in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i, when pretty printing is used, does not ensure the presence of '\0' characters, which allows context-dependent attackers to obtain sensitive information from process stack memory by reading output from X509_name_oneline, X509_name_print_ex, and unspecified other functions.

debian
почти 11 лет назад

The OBJ_obj2txt function in crypto/objects/obj_dat.c in OpenSSL 0.9.8 ...

github
около 3 лет назад

The OBJ_obj2txt function in crypto/objects/obj_dat.c in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i, when pretty printing is used, does not ensure the presence of '\0' characters, which allows context-dependent attackers to obtain sensitive information from process stack memory by reading output from X509_name_oneline, X509_name_print_ex, and unspecified other functions.

fstec
почти 11 лет назад

Уязвимость программного обеспечения OpenSSL, позволяющая удаленному злоумышленнику нарушить конфиденциальность защищаемой информации

4.3 Medium

CVSS2