Логотип exploitDog
bind:"CVE-2023-6129" OR bind:"CVE-2023-6237" OR bind:"CVE-2024-0727" OR bind:"CVE-2024-1298"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2023-6129" OR bind:"CVE-2023-6237" OR bind:"CVE-2024-0727" OR bind:"CVE-2024-1298"

Количество 56

Количество 56

rocky логотип

RLSA-2024:9088

8 месяцев назад

Moderate: edk2 security update

EPSS: Низкий
oracle-oval логотип

ELSA-2024-9088

около 1 года назад

ELSA-2024-9088: edk2 security update (MODERATE)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:0518-1

почти 2 года назад

Security update for openssl-3

EPSS: Низкий
oracle-oval логотип

ELSA-2024-2447

больше 1 года назад

ELSA-2024-2447: openssl and openssl-fips-provider security update (LOW)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:0172-1

почти 2 года назад

Security update for openssl-3

EPSS: Низкий
ubuntu логотип

CVE-2023-6129

почти 2 года назад

Issue summary: The POLY1305 MAC (message authentication code) implementation contains a bug that might corrupt the internal state of applications running on PowerPC CPU based platforms if the CPU provides vector instructions. Impact summary: If an attacker can influence whether the POLY1305 MAC algorithm is used, the application state might be corrupted with various application dependent consequences. The POLY1305 MAC (message authentication code) implementation in OpenSSL for PowerPC CPUs restores the contents of vector registers in a different order than they are saved. Thus the contents of some of these vector registers are corrupted when returning to the caller. The vulnerable code is used only on newer PowerPC processors supporting the PowerISA 2.07 instructions. The consequences of this kind of internal application state corruption can be various - from no consequences, if the calling application does not depend on the contents of non-volatile XMM registers at all, to the wors...

CVSS3: 6.5
EPSS: Низкий
redhat логотип

CVE-2023-6129

почти 2 года назад

Issue summary: The POLY1305 MAC (message authentication code) implementation contains a bug that might corrupt the internal state of applications running on PowerPC CPU based platforms if the CPU provides vector instructions. Impact summary: If an attacker can influence whether the POLY1305 MAC algorithm is used, the application state might be corrupted with various application dependent consequences. The POLY1305 MAC (message authentication code) implementation in OpenSSL for PowerPC CPUs restores the contents of vector registers in a different order than they are saved. Thus the contents of some of these vector registers are corrupted when returning to the caller. The vulnerable code is used only on newer PowerPC processors supporting the PowerISA 2.07 instructions. The consequences of this kind of internal application state corruption can be various - from no consequences, if the calling application does not depend on the contents of non-volatile XMM registers at all, to the wors...

CVSS3: 6.5
EPSS: Низкий
nvd логотип

CVE-2023-6129

почти 2 года назад

Issue summary: The POLY1305 MAC (message authentication code) implementation contains a bug that might corrupt the internal state of applications running on PowerPC CPU based platforms if the CPU provides vector instructions. Impact summary: If an attacker can influence whether the POLY1305 MAC algorithm is used, the application state might be corrupted with various application dependent consequences. The POLY1305 MAC (message authentication code) implementation in OpenSSL for PowerPC CPUs restores the contents of vector registers in a different order than they are saved. Thus the contents of some of these vector registers are corrupted when returning to the caller. The vulnerable code is used only on newer PowerPC processors supporting the PowerISA 2.07 instructions. The consequences of this kind of internal application state corruption can be various - from no consequences, if the calling application does not depend on the contents of non-volatile XMM registers at all, to the wors

CVSS3: 6.5
EPSS: Низкий
msrc логотип

CVE-2023-6129

почти 2 года назад

CVSS3: 6.5
EPSS: Низкий
debian логотип

CVE-2023-6129

почти 2 года назад

Issue summary: The POLY1305 MAC (message authentication code) implemen ...

CVSS3: 6.5
EPSS: Низкий
github логотип

GHSA-rj8q-prqp-jwfg

почти 2 года назад

Issue summary: The POLY1305 MAC (message authentication code) implementation contains a bug that might corrupt the internal state of applications running on PowerPC CPU based platforms if the CPU provides vector instructions. Impact summary: If an attacker can influence whether the POLY1305 MAC algorithm is used, the application state might be corrupted with various application dependent consequences. The POLY1305 MAC (message authentication code) implementation in OpenSSL for PowerPC CPUs restores the contents of vector registers in a different order than they are saved. Thus the contents of some of these vector registers are corrupted when returning to the caller. The vulnerable code is used only on newer PowerPC processors supporting the PowerISA 2.07 instructions. The consequences of this kind of internal application state corruption can be various - from no consequences, if the calling application does not depend on the contents of non-volatile XMM registers at all, to the w...

CVSS3: 6.5
EPSS: Низкий
fstec логотип

BDU:2024-02846

почти 2 года назад

Уязвимость реализации алгоритма POLY1305 MAC криптографической библиотеки OpenSSL, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 6.5
EPSS: Низкий
ubuntu логотип

CVE-2023-6237

больше 1 года назад

Issue summary: Checking excessively long invalid RSA public keys may take a long time. Impact summary: Applications that use the function EVP_PKEY_public_check() to check RSA public keys may experience long delays. Where the key that is being checked has been obtained from an untrusted source this may lead to a Denial of Service. When function EVP_PKEY_public_check() is called on RSA public keys, a computation is done to confirm that the RSA modulus, n, is composite. For valid RSA keys, n is a product of two or more large primes and this computation completes quickly. However, if n is an overly large prime, then this computation would take a long time. An application that calls EVP_PKEY_public_check() and supplies an RSA key obtained from an untrusted source could be vulnerable to a Denial of Service attack. The function EVP_PKEY_public_check() is not called from other OpenSSL functions however it is called from the OpenSSL pkey command line application. For that reason that applica...

CVSS3: 5.9
EPSS: Низкий
redhat логотип

CVE-2023-6237

почти 2 года назад

Issue summary: Checking excessively long invalid RSA public keys may take a long time. Impact summary: Applications that use the function EVP_PKEY_public_check() to check RSA public keys may experience long delays. Where the key that is being checked has been obtained from an untrusted source this may lead to a Denial of Service. When function EVP_PKEY_public_check() is called on RSA public keys, a computation is done to confirm that the RSA modulus, n, is composite. For valid RSA keys, n is a product of two or more large primes and this computation completes quickly. However, if n is an overly large prime, then this computation would take a long time. An application that calls EVP_PKEY_public_check() and supplies an RSA key obtained from an untrusted source could be vulnerable to a Denial of Service attack. The function EVP_PKEY_public_check() is not called from other OpenSSL functions however it is called from the OpenSSL pkey command line application. For that reason that applica...

CVSS3: 5.9
EPSS: Низкий
nvd логотип

CVE-2023-6237

больше 1 года назад

Issue summary: Checking excessively long invalid RSA public keys may take a long time. Impact summary: Applications that use the function EVP_PKEY_public_check() to check RSA public keys may experience long delays. Where the key that is being checked has been obtained from an untrusted source this may lead to a Denial of Service. When function EVP_PKEY_public_check() is called on RSA public keys, a computation is done to confirm that the RSA modulus, n, is composite. For valid RSA keys, n is a product of two or more large primes and this computation completes quickly. However, if n is an overly large prime, then this computation would take a long time. An application that calls EVP_PKEY_public_check() and supplies an RSA key obtained from an untrusted source could be vulnerable to a Denial of Service attack. The function EVP_PKEY_public_check() is not called from other OpenSSL functions however it is called from the OpenSSL pkey command line application. For that reason that applic

CVSS3: 5.9
EPSS: Низкий
msrc логотип

CVE-2023-6237

около 1 года назад

CVSS3: 5.9
EPSS: Низкий
debian логотип

CVE-2023-6237

больше 1 года назад

Issue summary: Checking excessively long invalid RSA public keys may t ...

CVSS3: 5.9
EPSS: Низкий
github логотип

GHSA-hvc4-mjv4-5mw6

больше 1 года назад

Issue summary: Checking excessively long invalid RSA public keys may take a long time. Impact summary: Applications that use the function EVP_PKEY_public_check() to check RSA public keys may experience long delays. Where the key that is being checked has been obtained from an untrusted source this may lead to a Denial of Service. When function EVP_PKEY_public_check() is called on RSA public keys, a computation is done to confirm that the RSA modulus, n, is composite. For valid RSA keys, n is a product of two or more large primes and this computation completes quickly. However, if n is an overly large prime, then this computation would take a long time. An application that calls EVP_PKEY_public_check() and supplies an RSA key obtained from an untrusted source could be vulnerable to a Denial of Service attack. The function EVP_PKEY_public_check() is not called from other OpenSSL functions however it is called from the OpenSSL pkey command line application. For that reason that app...

CVSS3: 5.9
EPSS: Низкий
fstec логотип

BDU:2024-01137

почти 2 года назад

Уязвимость функции EVP_PKEY_public_check() библиотеки OpenSSL, позволяющая нарушителю вызвать отказ в обслуживании (DoS)

CVSS3: 5.9
EPSS: Низкий
redos логотип

ROS-20240503-11

больше 1 года назад

Уязвимость openssl3

CVSS3: 5.9
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
rocky логотип
RLSA-2024:9088

Moderate: edk2 security update

8 месяцев назад
oracle-oval логотип
ELSA-2024-9088

ELSA-2024-9088: edk2 security update (MODERATE)

около 1 года назад
suse-cvrf логотип
SUSE-SU-2024:0518-1

Security update for openssl-3

почти 2 года назад
oracle-oval логотип
ELSA-2024-2447

ELSA-2024-2447: openssl and openssl-fips-provider security update (LOW)

больше 1 года назад
suse-cvrf логотип
SUSE-SU-2024:0172-1

Security update for openssl-3

почти 2 года назад
ubuntu логотип
CVE-2023-6129

Issue summary: The POLY1305 MAC (message authentication code) implementation contains a bug that might corrupt the internal state of applications running on PowerPC CPU based platforms if the CPU provides vector instructions. Impact summary: If an attacker can influence whether the POLY1305 MAC algorithm is used, the application state might be corrupted with various application dependent consequences. The POLY1305 MAC (message authentication code) implementation in OpenSSL for PowerPC CPUs restores the contents of vector registers in a different order than they are saved. Thus the contents of some of these vector registers are corrupted when returning to the caller. The vulnerable code is used only on newer PowerPC processors supporting the PowerISA 2.07 instructions. The consequences of this kind of internal application state corruption can be various - from no consequences, if the calling application does not depend on the contents of non-volatile XMM registers at all, to the wors...

CVSS3: 6.5
2%
Низкий
почти 2 года назад
redhat логотип
CVE-2023-6129

Issue summary: The POLY1305 MAC (message authentication code) implementation contains a bug that might corrupt the internal state of applications running on PowerPC CPU based platforms if the CPU provides vector instructions. Impact summary: If an attacker can influence whether the POLY1305 MAC algorithm is used, the application state might be corrupted with various application dependent consequences. The POLY1305 MAC (message authentication code) implementation in OpenSSL for PowerPC CPUs restores the contents of vector registers in a different order than they are saved. Thus the contents of some of these vector registers are corrupted when returning to the caller. The vulnerable code is used only on newer PowerPC processors supporting the PowerISA 2.07 instructions. The consequences of this kind of internal application state corruption can be various - from no consequences, if the calling application does not depend on the contents of non-volatile XMM registers at all, to the wors...

CVSS3: 6.5
2%
Низкий
почти 2 года назад
nvd логотип
CVE-2023-6129

Issue summary: The POLY1305 MAC (message authentication code) implementation contains a bug that might corrupt the internal state of applications running on PowerPC CPU based platforms if the CPU provides vector instructions. Impact summary: If an attacker can influence whether the POLY1305 MAC algorithm is used, the application state might be corrupted with various application dependent consequences. The POLY1305 MAC (message authentication code) implementation in OpenSSL for PowerPC CPUs restores the contents of vector registers in a different order than they are saved. Thus the contents of some of these vector registers are corrupted when returning to the caller. The vulnerable code is used only on newer PowerPC processors supporting the PowerISA 2.07 instructions. The consequences of this kind of internal application state corruption can be various - from no consequences, if the calling application does not depend on the contents of non-volatile XMM registers at all, to the wors

CVSS3: 6.5
2%
Низкий
почти 2 года назад
msrc логотип
CVSS3: 6.5
2%
Низкий
почти 2 года назад
debian логотип
CVE-2023-6129

Issue summary: The POLY1305 MAC (message authentication code) implemen ...

CVSS3: 6.5
2%
Низкий
почти 2 года назад
github логотип
GHSA-rj8q-prqp-jwfg

Issue summary: The POLY1305 MAC (message authentication code) implementation contains a bug that might corrupt the internal state of applications running on PowerPC CPU based platforms if the CPU provides vector instructions. Impact summary: If an attacker can influence whether the POLY1305 MAC algorithm is used, the application state might be corrupted with various application dependent consequences. The POLY1305 MAC (message authentication code) implementation in OpenSSL for PowerPC CPUs restores the contents of vector registers in a different order than they are saved. Thus the contents of some of these vector registers are corrupted when returning to the caller. The vulnerable code is used only on newer PowerPC processors supporting the PowerISA 2.07 instructions. The consequences of this kind of internal application state corruption can be various - from no consequences, if the calling application does not depend on the contents of non-volatile XMM registers at all, to the w...

CVSS3: 6.5
2%
Низкий
почти 2 года назад
fstec логотип
BDU:2024-02846

Уязвимость реализации алгоритма POLY1305 MAC криптографической библиотеки OpenSSL, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 6.5
2%
Низкий
почти 2 года назад
ubuntu логотип
CVE-2023-6237

Issue summary: Checking excessively long invalid RSA public keys may take a long time. Impact summary: Applications that use the function EVP_PKEY_public_check() to check RSA public keys may experience long delays. Where the key that is being checked has been obtained from an untrusted source this may lead to a Denial of Service. When function EVP_PKEY_public_check() is called on RSA public keys, a computation is done to confirm that the RSA modulus, n, is composite. For valid RSA keys, n is a product of two or more large primes and this computation completes quickly. However, if n is an overly large prime, then this computation would take a long time. An application that calls EVP_PKEY_public_check() and supplies an RSA key obtained from an untrusted source could be vulnerable to a Denial of Service attack. The function EVP_PKEY_public_check() is not called from other OpenSSL functions however it is called from the OpenSSL pkey command line application. For that reason that applica...

CVSS3: 5.9
1%
Низкий
больше 1 года назад
redhat логотип
CVE-2023-6237

Issue summary: Checking excessively long invalid RSA public keys may take a long time. Impact summary: Applications that use the function EVP_PKEY_public_check() to check RSA public keys may experience long delays. Where the key that is being checked has been obtained from an untrusted source this may lead to a Denial of Service. When function EVP_PKEY_public_check() is called on RSA public keys, a computation is done to confirm that the RSA modulus, n, is composite. For valid RSA keys, n is a product of two or more large primes and this computation completes quickly. However, if n is an overly large prime, then this computation would take a long time. An application that calls EVP_PKEY_public_check() and supplies an RSA key obtained from an untrusted source could be vulnerable to a Denial of Service attack. The function EVP_PKEY_public_check() is not called from other OpenSSL functions however it is called from the OpenSSL pkey command line application. For that reason that applica...

CVSS3: 5.9
1%
Низкий
почти 2 года назад
nvd логотип
CVE-2023-6237

Issue summary: Checking excessively long invalid RSA public keys may take a long time. Impact summary: Applications that use the function EVP_PKEY_public_check() to check RSA public keys may experience long delays. Where the key that is being checked has been obtained from an untrusted source this may lead to a Denial of Service. When function EVP_PKEY_public_check() is called on RSA public keys, a computation is done to confirm that the RSA modulus, n, is composite. For valid RSA keys, n is a product of two or more large primes and this computation completes quickly. However, if n is an overly large prime, then this computation would take a long time. An application that calls EVP_PKEY_public_check() and supplies an RSA key obtained from an untrusted source could be vulnerable to a Denial of Service attack. The function EVP_PKEY_public_check() is not called from other OpenSSL functions however it is called from the OpenSSL pkey command line application. For that reason that applic

CVSS3: 5.9
1%
Низкий
больше 1 года назад
msrc логотип
CVSS3: 5.9
1%
Низкий
около 1 года назад
debian логотип
CVE-2023-6237

Issue summary: Checking excessively long invalid RSA public keys may t ...

CVSS3: 5.9
1%
Низкий
больше 1 года назад
github логотип
GHSA-hvc4-mjv4-5mw6

Issue summary: Checking excessively long invalid RSA public keys may take a long time. Impact summary: Applications that use the function EVP_PKEY_public_check() to check RSA public keys may experience long delays. Where the key that is being checked has been obtained from an untrusted source this may lead to a Denial of Service. When function EVP_PKEY_public_check() is called on RSA public keys, a computation is done to confirm that the RSA modulus, n, is composite. For valid RSA keys, n is a product of two or more large primes and this computation completes quickly. However, if n is an overly large prime, then this computation would take a long time. An application that calls EVP_PKEY_public_check() and supplies an RSA key obtained from an untrusted source could be vulnerable to a Denial of Service attack. The function EVP_PKEY_public_check() is not called from other OpenSSL functions however it is called from the OpenSSL pkey command line application. For that reason that app...

CVSS3: 5.9
1%
Низкий
больше 1 года назад
fstec логотип
BDU:2024-01137

Уязвимость функции EVP_PKEY_public_check() библиотеки OpenSSL, позволяющая нарушителю вызвать отказ в обслуживании (DoS)

CVSS3: 5.9
1%
Низкий
почти 2 года назад
redos логотип
ROS-20240503-11

Уязвимость openssl3

CVSS3: 5.9
1%
Низкий
больше 1 года назад

Уязвимостей на страницу