Логотип exploitDog
bind: "CVE-2023-5363"
Консоль
Логотип exploitDog

exploitDog

bind: "CVE-2023-5363"

Количество 14

Количество 14

ubuntu логотип

CVE-2023-5363

около 2 лет назад

Issue summary: A bug has been identified in the processing of key and initialisation vector (IV) lengths. This can lead to potential truncation or overruns during the initialisation of some symmetric ciphers. Impact summary: A truncation in the IV can result in non-uniqueness, which could result in loss of confidentiality for some cipher modes. When calling EVP_EncryptInit_ex2(), EVP_DecryptInit_ex2() or EVP_CipherInit_ex2() the provided OSSL_PARAM array is processed after the key and IV have been established. Any alterations to the key length, via the "keylen" parameter or the IV length, via the "ivlen" parameter, within the OSSL_PARAM array will not take effect as intended, potentially causing truncation or overreading of these values. The following ciphers and cipher modes are impacted: RC2, RC4, RC5, CCM, GCM and OCB. For the CCM, GCM and OCB cipher modes, truncation of the IV can result in loss of confidentiality. For example, when following NIST's SP 800-38D section 8.2.1 ...

CVSS3: 7.5
EPSS: Низкий
redhat логотип

CVE-2023-5363

около 2 лет назад

Issue summary: A bug has been identified in the processing of key and initialisation vector (IV) lengths. This can lead to potential truncation or overruns during the initialisation of some symmetric ciphers. Impact summary: A truncation in the IV can result in non-uniqueness, which could result in loss of confidentiality for some cipher modes. When calling EVP_EncryptInit_ex2(), EVP_DecryptInit_ex2() or EVP_CipherInit_ex2() the provided OSSL_PARAM array is processed after the key and IV have been established. Any alterations to the key length, via the "keylen" parameter or the IV length, via the "ivlen" parameter, within the OSSL_PARAM array will not take effect as intended, potentially causing truncation or overreading of these values. The following ciphers and cipher modes are impacted: RC2, RC4, RC5, CCM, GCM and OCB. For the CCM, GCM and OCB cipher modes, truncation of the IV can result in loss of confidentiality. For example, when following NIST's SP 800-38D section 8.2.1 ...

CVSS3: 7.5
EPSS: Низкий
nvd логотип

CVE-2023-5363

около 2 лет назад

Issue summary: A bug has been identified in the processing of key and initialisation vector (IV) lengths. This can lead to potential truncation or overruns during the initialisation of some symmetric ciphers. Impact summary: A truncation in the IV can result in non-uniqueness, which could result in loss of confidentiality for some cipher modes. When calling EVP_EncryptInit_ex2(), EVP_DecryptInit_ex2() or EVP_CipherInit_ex2() the provided OSSL_PARAM array is processed after the key and IV have been established. Any alterations to the key length, via the "keylen" parameter or the IV length, via the "ivlen" parameter, within the OSSL_PARAM array will not take effect as intended, potentially causing truncation or overreading of these values. The following ciphers and cipher modes are impacted: RC2, RC4, RC5, CCM, GCM and OCB. For the CCM, GCM and OCB cipher modes, truncation of the IV can result in loss of confidentiality. For example, when following NIST's SP 800-38D section 8.2.1

CVSS3: 7.5
EPSS: Низкий
msrc логотип

CVE-2023-5363

около 2 лет назад

CVSS3: 7.5
EPSS: Низкий
debian логотип

CVE-2023-5363

около 2 лет назад

Issue summary: A bug has been identified in the processing of key and ...

CVSS3: 7.5
EPSS: Низкий
redos логотип

ROS-20231110-02

почти 2 года назад

Уязвимость OpenSSL

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-xw78-pcr6-wrg8

около 2 лет назад

Issue summary: A bug has been identified in the processing of key and initialisation vector (IV) lengths. This can lead to potential truncation or overruns during the initialisation of some symmetric ciphers. Impact summary: A truncation in the IV can result in non-uniqueness, which could result in loss of confidentiality for some cipher modes. When calling EVP_EncryptInit_ex2(), EVP_DecryptInit_ex2() or EVP_CipherInit_ex2() the provided OSSL_PARAM array is processed after the key and IV have been established. Any alterations to the key length, via the "keylen" parameter or the IV length, via the "ivlen" parameter, within the OSSL_PARAM array will not take effect as intended, potentially causing truncation or overreading of these values. The following ciphers and cipher modes are impacted: RC2, RC4, RC5, CCM, GCM and OCB. For the CCM, GCM and OCB cipher modes, truncation of the IV can result in loss of confidentiality. For example, when following NIST's SP 800-38D section 8.2...

CVSS3: 7.5
EPSS: Низкий
oracle-oval логотип

ELSA-2024-12093

почти 2 года назад

ELSA-2024-12093: openssl security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2024-0310

почти 2 года назад

ELSA-2024-0310: openssl security update (MODERATE)

EPSS: Низкий
fstec логотип

BDU:2023-07691

около 2 лет назад

Уязвимость функций EVP_EncryptInit_ex2(), EVP_DecryptInit_ex2(), EVP_CipherInit_ex2() криптографической библиотеки OpenSSL, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

CVSS3: 7.5
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:4190-1

около 2 лет назад

Security update for openssl-3

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:4189-1

около 2 лет назад

Security update for openssl-3

EPSS: Низкий
redos логотип

ROS-20240409-06

больше 1 года назад

Множественные уязвимости salt

CVSS3: 7.8
EPSS: Низкий
redos логотип

ROS-20231109-01

почти 2 года назад

Множественные уязвимости golang

CVSS3: 9.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2023-5363

Issue summary: A bug has been identified in the processing of key and initialisation vector (IV) lengths. This can lead to potential truncation or overruns during the initialisation of some symmetric ciphers. Impact summary: A truncation in the IV can result in non-uniqueness, which could result in loss of confidentiality for some cipher modes. When calling EVP_EncryptInit_ex2(), EVP_DecryptInit_ex2() or EVP_CipherInit_ex2() the provided OSSL_PARAM array is processed after the key and IV have been established. Any alterations to the key length, via the "keylen" parameter or the IV length, via the "ivlen" parameter, within the OSSL_PARAM array will not take effect as intended, potentially causing truncation or overreading of these values. The following ciphers and cipher modes are impacted: RC2, RC4, RC5, CCM, GCM and OCB. For the CCM, GCM and OCB cipher modes, truncation of the IV can result in loss of confidentiality. For example, when following NIST's SP 800-38D section 8.2.1 ...

CVSS3: 7.5
1%
Низкий
около 2 лет назад
redhat логотип
CVE-2023-5363

Issue summary: A bug has been identified in the processing of key and initialisation vector (IV) lengths. This can lead to potential truncation or overruns during the initialisation of some symmetric ciphers. Impact summary: A truncation in the IV can result in non-uniqueness, which could result in loss of confidentiality for some cipher modes. When calling EVP_EncryptInit_ex2(), EVP_DecryptInit_ex2() or EVP_CipherInit_ex2() the provided OSSL_PARAM array is processed after the key and IV have been established. Any alterations to the key length, via the "keylen" parameter or the IV length, via the "ivlen" parameter, within the OSSL_PARAM array will not take effect as intended, potentially causing truncation or overreading of these values. The following ciphers and cipher modes are impacted: RC2, RC4, RC5, CCM, GCM and OCB. For the CCM, GCM and OCB cipher modes, truncation of the IV can result in loss of confidentiality. For example, when following NIST's SP 800-38D section 8.2.1 ...

CVSS3: 7.5
1%
Низкий
около 2 лет назад
nvd логотип
CVE-2023-5363

Issue summary: A bug has been identified in the processing of key and initialisation vector (IV) lengths. This can lead to potential truncation or overruns during the initialisation of some symmetric ciphers. Impact summary: A truncation in the IV can result in non-uniqueness, which could result in loss of confidentiality for some cipher modes. When calling EVP_EncryptInit_ex2(), EVP_DecryptInit_ex2() or EVP_CipherInit_ex2() the provided OSSL_PARAM array is processed after the key and IV have been established. Any alterations to the key length, via the "keylen" parameter or the IV length, via the "ivlen" parameter, within the OSSL_PARAM array will not take effect as intended, potentially causing truncation or overreading of these values. The following ciphers and cipher modes are impacted: RC2, RC4, RC5, CCM, GCM and OCB. For the CCM, GCM and OCB cipher modes, truncation of the IV can result in loss of confidentiality. For example, when following NIST's SP 800-38D section 8.2.1

CVSS3: 7.5
1%
Низкий
около 2 лет назад
msrc логотип
CVSS3: 7.5
1%
Низкий
около 2 лет назад
debian логотип
CVE-2023-5363

Issue summary: A bug has been identified in the processing of key and ...

CVSS3: 7.5
1%
Низкий
около 2 лет назад
redos логотип
ROS-20231110-02

Уязвимость OpenSSL

CVSS3: 7.5
1%
Низкий
почти 2 года назад
github логотип
GHSA-xw78-pcr6-wrg8

Issue summary: A bug has been identified in the processing of key and initialisation vector (IV) lengths. This can lead to potential truncation or overruns during the initialisation of some symmetric ciphers. Impact summary: A truncation in the IV can result in non-uniqueness, which could result in loss of confidentiality for some cipher modes. When calling EVP_EncryptInit_ex2(), EVP_DecryptInit_ex2() or EVP_CipherInit_ex2() the provided OSSL_PARAM array is processed after the key and IV have been established. Any alterations to the key length, via the "keylen" parameter or the IV length, via the "ivlen" parameter, within the OSSL_PARAM array will not take effect as intended, potentially causing truncation or overreading of these values. The following ciphers and cipher modes are impacted: RC2, RC4, RC5, CCM, GCM and OCB. For the CCM, GCM and OCB cipher modes, truncation of the IV can result in loss of confidentiality. For example, when following NIST's SP 800-38D section 8.2...

CVSS3: 7.5
1%
Низкий
около 2 лет назад
oracle-oval логотип
ELSA-2024-12093

ELSA-2024-12093: openssl security update (IMPORTANT)

почти 2 года назад
oracle-oval логотип
ELSA-2024-0310

ELSA-2024-0310: openssl security update (MODERATE)

почти 2 года назад
fstec логотип
BDU:2023-07691

Уязвимость функций EVP_EncryptInit_ex2(), EVP_DecryptInit_ex2(), EVP_CipherInit_ex2() криптографической библиотеки OpenSSL, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

CVSS3: 7.5
1%
Низкий
около 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:4190-1

Security update for openssl-3

около 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:4189-1

Security update for openssl-3

около 2 лет назад
redos логотип
ROS-20240409-06

Множественные уязвимости salt

CVSS3: 7.8
больше 1 года назад
redos логотип
ROS-20231109-01

Множественные уязвимости golang

CVSS3: 9.8
почти 2 года назад

Уязвимостей на страницу