Количество 21
Количество 21
GHSA-w42r-ph9f-9x66
Issue summary: A type confusion vulnerability exists in the TimeStamp Response verification code where an ASN1_TYPE union member is accessed without first validating the type, causing an invalid or NULL pointer dereference when processing a malformed TimeStamp Response file. Impact summary: An application calling TS_RESP_verify_response() with a malformed TimeStamp Response can be caused to dereference an invalid or NULL pointer when reading, resulting in a Denial of Service. The functions ossl_ess_get_signing_cert() and ossl_ess_get_signing_cert_v2() access the signing cert attribute value without validating its type. When the type is not V_ASN1_SEQUENCE, this results in accessing invalid memory through the ASN1_TYPE union, causing a crash. Exploiting this vulnerability requires an attacker to provide a malformed TimeStamp Response to an application that verifies timestamp responses. The TimeStamp protocol (RFC 3161) is not widely used and the impact of the exploit is just a Den...
CVE-2025-69420
Issue summary: A type confusion vulnerability exists in the TimeStamp Response verification code where an ASN1_TYPE union member is accessed without first validating the type, causing an invalid or NULL pointer dereference when processing a malformed TimeStamp Response file. Impact summary: An application calling TS_RESP_verify_response() with a malformed TimeStamp Response can be caused to dereference an invalid or NULL pointer when reading, resulting in a Denial of Service. The functions ossl_ess_get_signing_cert() and ossl_ess_get_signing_cert_v2() access the signing cert attribute value without validating its type. When the type is not V_ASN1_SEQUENCE, this results in accessing invalid memory through the ASN1_TYPE union, causing a crash. Exploiting this vulnerability requires an attacker to provide a malformed TimeStamp Response to an application that verifies timestamp responses. The TimeStamp protocol (RFC 3161) is not widely used and the impact of the exploit is just a Denial...
CVE-2025-69420
Issue summary: A type confusion vulnerability exists in the TimeStamp Response verification code where an ASN1_TYPE union member is accessed without first validating the type, causing an invalid or NULL pointer dereference when processing a malformed TimeStamp Response file. Impact summary: An application calling TS_RESP_verify_response() with a malformed TimeStamp Response can be caused to dereference an invalid or NULL pointer when reading, resulting in a Denial of Service. The functions ossl_ess_get_signing_cert() and ossl_ess_get_signing_cert_v2() access the signing cert attribute value without validating its type. When the type is not V_ASN1_SEQUENCE, this results in accessing invalid memory through the ASN1_TYPE union, causing a crash. Exploiting this vulnerability requires an attacker to provide a malformed TimeStamp Response to an application that verifies timestamp responses. The TimeStamp protocol (RFC 3161) is not widely used and the impact of the exploit is just a Denial
CVE-2025-69420
Issue summary: A type confusion vulnerability exists in the TimeStamp ...
SUSE-SU-2026:0333-1
Security update for openssl-1_0_0
SUSE-SU-2026:0332-1
Security update for openssl-1_0_0
SUSE-SU-2026:0360-1
Security update for openssl-1_1
SUSE-SU-2026:0359-1
Security update for openssl-1_1
SUSE-SU-2026:0358-1
Security update for openssl-1_1
SUSE-SU-2026:0346-1
Security update for openssl-1_1
SUSE-SU-2026:0331-1
Security update for openssl-1_1
SUSE-SU-2026:0312-1
Security update for openssl-3
SUSE-SU-2026:0311-1
Security update for openssl-3
SUSE-SU-2026:0310-1
Security update for openssl-3
SUSE-SU-2026:0309-1
Security update for openssl-3
RLSA-2026:1472
Important: openssl security update
ELSA-2026-50081
ELSA-2026-50081: openssl security update (IMPORTANT)
ELSA-2026-50080
ELSA-2026-50080: openssl security update (IMPORTANT)
ELSA-2026-50075
ELSA-2026-50075: openssl security update (IMPORTANT)
ELSA-2026-1473
ELSA-2026-1473: openssl security update (IMPORTANT)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
GHSA-w42r-ph9f-9x66 Issue summary: A type confusion vulnerability exists in the TimeStamp Response verification code where an ASN1_TYPE union member is accessed without first validating the type, causing an invalid or NULL pointer dereference when processing a malformed TimeStamp Response file. Impact summary: An application calling TS_RESP_verify_response() with a malformed TimeStamp Response can be caused to dereference an invalid or NULL pointer when reading, resulting in a Denial of Service. The functions ossl_ess_get_signing_cert() and ossl_ess_get_signing_cert_v2() access the signing cert attribute value without validating its type. When the type is not V_ASN1_SEQUENCE, this results in accessing invalid memory through the ASN1_TYPE union, causing a crash. Exploiting this vulnerability requires an attacker to provide a malformed TimeStamp Response to an application that verifies timestamp responses. The TimeStamp protocol (RFC 3161) is not widely used and the impact of the exploit is just a Den... | CVSS3: 7.5 | 0% Низкий | 8 дней назад | |
CVE-2025-69420 Issue summary: A type confusion vulnerability exists in the TimeStamp Response verification code where an ASN1_TYPE union member is accessed without first validating the type, causing an invalid or NULL pointer dereference when processing a malformed TimeStamp Response file. Impact summary: An application calling TS_RESP_verify_response() with a malformed TimeStamp Response can be caused to dereference an invalid or NULL pointer when reading, resulting in a Denial of Service. The functions ossl_ess_get_signing_cert() and ossl_ess_get_signing_cert_v2() access the signing cert attribute value without validating its type. When the type is not V_ASN1_SEQUENCE, this results in accessing invalid memory through the ASN1_TYPE union, causing a crash. Exploiting this vulnerability requires an attacker to provide a malformed TimeStamp Response to an application that verifies timestamp responses. The TimeStamp protocol (RFC 3161) is not widely used and the impact of the exploit is just a Denial... | CVSS3: 7.5 | 0% Низкий | 8 дней назад | |
CVE-2025-69420 Issue summary: A type confusion vulnerability exists in the TimeStamp Response verification code where an ASN1_TYPE union member is accessed without first validating the type, causing an invalid or NULL pointer dereference when processing a malformed TimeStamp Response file. Impact summary: An application calling TS_RESP_verify_response() with a malformed TimeStamp Response can be caused to dereference an invalid or NULL pointer when reading, resulting in a Denial of Service. The functions ossl_ess_get_signing_cert() and ossl_ess_get_signing_cert_v2() access the signing cert attribute value without validating its type. When the type is not V_ASN1_SEQUENCE, this results in accessing invalid memory through the ASN1_TYPE union, causing a crash. Exploiting this vulnerability requires an attacker to provide a malformed TimeStamp Response to an application that verifies timestamp responses. The TimeStamp protocol (RFC 3161) is not widely used and the impact of the exploit is just a Denial | CVSS3: 7.5 | 0% Низкий | 8 дней назад | |
CVE-2025-69420 Issue summary: A type confusion vulnerability exists in the TimeStamp ... | CVSS3: 7.5 | 0% Низкий | 8 дней назад | |
SUSE-SU-2026:0333-1 Security update for openssl-1_0_0 | 7 дней назад | |||
SUSE-SU-2026:0332-1 Security update for openssl-1_0_0 | 7 дней назад | |||
SUSE-SU-2026:0360-1 Security update for openssl-1_1 | 3 дня назад | |||
SUSE-SU-2026:0359-1 Security update for openssl-1_1 | 3 дня назад | |||
SUSE-SU-2026:0358-1 Security update for openssl-1_1 | 3 дня назад | |||
SUSE-SU-2026:0346-1 Security update for openssl-1_1 | 6 дней назад | |||
SUSE-SU-2026:0331-1 Security update for openssl-1_1 | 7 дней назад | |||
SUSE-SU-2026:0312-1 Security update for openssl-3 | 8 дней назад | |||
SUSE-SU-2026:0311-1 Security update for openssl-3 | 8 дней назад | |||
SUSE-SU-2026:0310-1 Security update for openssl-3 | 8 дней назад | |||
SUSE-SU-2026:0309-1 Security update for openssl-3 | 8 дней назад | |||
RLSA-2026:1472 Important: openssl security update | 5 дней назад | |||
ELSA-2026-50081 ELSA-2026-50081: openssl security update (IMPORTANT) | 6 дней назад | |||
ELSA-2026-50080 ELSA-2026-50080: openssl security update (IMPORTANT) | 6 дней назад | |||
ELSA-2026-50075 ELSA-2026-50075: openssl security update (IMPORTANT) | 7 дней назад | |||
ELSA-2026-1473 ELSA-2026-1473: openssl security update (IMPORTANT) | 8 дней назад |
Уязвимостей на страницу