Логотип exploitDog
bind:"CVE-2023-6237" OR bind:"CVE-2024-1298" OR bind:"CVE-2024-0727" OR bind:"CVE-2023-6129"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2023-6237" OR bind:"CVE-2024-1298" OR bind:"CVE-2024-0727" OR bind:"CVE-2023-6129"

Количество 52

Количество 52

redhat логотип

CVE-2023-6129

больше 1 года назад

Issue summary: The POLY1305 MAC (message authentication code) implementation contains a bug that might corrupt the internal state of applications running on PowerPC CPU based platforms if the CPU provides vector instructions. Impact summary: If an attacker can influence whether the POLY1305 MAC algorithm is used, the application state might be corrupted with various application dependent consequences. The POLY1305 MAC (message authentication code) implementation in OpenSSL for PowerPC CPUs restores the contents of vector registers in a different order than they are saved. Thus the contents of some of these vector registers are corrupted when returning to the caller. The vulnerable code is used only on newer PowerPC processors supporting the PowerISA 2.07 instructions. The consequences of this kind of internal application state corruption can be various - from no consequences, if the calling application does not depend on the contents of non-volatile XMM registers at all, to the wors...

CVSS3: 6.5
EPSS: Низкий
nvd логотип

CVE-2023-6129

больше 1 года назад

Issue summary: The POLY1305 MAC (message authentication code) implementation contains a bug that might corrupt the internal state of applications running on PowerPC CPU based platforms if the CPU provides vector instructions. Impact summary: If an attacker can influence whether the POLY1305 MAC algorithm is used, the application state might be corrupted with various application dependent consequences. The POLY1305 MAC (message authentication code) implementation in OpenSSL for PowerPC CPUs restores the contents of vector registers in a different order than they are saved. Thus the contents of some of these vector registers are corrupted when returning to the caller. The vulnerable code is used only on newer PowerPC processors supporting the PowerISA 2.07 instructions. The consequences of this kind of internal application state corruption can be various - from no consequences, if the calling application does not depend on the contents of non-volatile XMM registers at all, to the wors

CVSS3: 6.5
EPSS: Низкий
msrc логотип

CVE-2023-6129

больше 1 года назад

CVSS3: 6.5
EPSS: Низкий
debian логотип

CVE-2023-6129

больше 1 года назад

Issue summary: The POLY1305 MAC (message authentication code) implemen ...

CVSS3: 6.5
EPSS: Низкий
rocky логотип

RLSA-2024:5297

около 1 месяца назад

Moderate: edk2 security update

EPSS: Низкий
oracle-oval логотип

ELSA-2024-5297

10 месяцев назад

ELSA-2024-5297: edk2 security update (MODERATE)

EPSS: Низкий
ubuntu логотип

CVE-2024-0727

больше 1 года назад

Issue summary: Processing a maliciously formatted PKCS12 file may lead OpenSSL to crash leading to a potential Denial of Service attack Impact summary: Applications loading files in the PKCS12 format from untrusted sources might terminate abruptly. A file in PKCS12 format can contain certificates and keys and may come from an untrusted source. The PKCS12 specification allows certain fields to be NULL, but OpenSSL does not correctly check for this case. This can lead to a NULL pointer dereference that results in OpenSSL crashing. If an application processes PKCS12 files from an untrusted source using the OpenSSL APIs then that application will be vulnerable to this issue. OpenSSL APIs that are vulnerable to this are: PKCS12_parse(), PKCS12_unpack_p7data(), PKCS12_unpack_p7encdata(), PKCS12_unpack_authsafes() and PKCS12_newpass(). We have also fixed a similar issue in SMIME_write_PKCS7(). However since this function is related to writing data we do not consider it security significant...

CVSS3: 5.5
EPSS: Низкий
redhat логотип

CVE-2024-0727

больше 1 года назад

Issue summary: Processing a maliciously formatted PKCS12 file may lead OpenSSL to crash leading to a potential Denial of Service attack Impact summary: Applications loading files in the PKCS12 format from untrusted sources might terminate abruptly. A file in PKCS12 format can contain certificates and keys and may come from an untrusted source. The PKCS12 specification allows certain fields to be NULL, but OpenSSL does not correctly check for this case. This can lead to a NULL pointer dereference that results in OpenSSL crashing. If an application processes PKCS12 files from an untrusted source using the OpenSSL APIs then that application will be vulnerable to this issue. OpenSSL APIs that are vulnerable to this are: PKCS12_parse(), PKCS12_unpack_p7data(), PKCS12_unpack_p7encdata(), PKCS12_unpack_authsafes() and PKCS12_newpass(). We have also fixed a similar issue in SMIME_write_PKCS7(). However since this function is related to writing data we do not consider it security significant...

CVSS3: 5.5
EPSS: Низкий
nvd логотип

CVE-2024-0727

больше 1 года назад

Issue summary: Processing a maliciously formatted PKCS12 file may lead OpenSSL to crash leading to a potential Denial of Service attack Impact summary: Applications loading files in the PKCS12 format from untrusted sources might terminate abruptly. A file in PKCS12 format can contain certificates and keys and may come from an untrusted source. The PKCS12 specification allows certain fields to be NULL, but OpenSSL does not correctly check for this case. This can lead to a NULL pointer dereference that results in OpenSSL crashing. If an application processes PKCS12 files from an untrusted source using the OpenSSL APIs then that application will be vulnerable to this issue. OpenSSL APIs that are vulnerable to this are: PKCS12_parse(), PKCS12_unpack_p7data(), PKCS12_unpack_p7encdata(), PKCS12_unpack_authsafes() and PKCS12_newpass(). We have also fixed a similar issue in SMIME_write_PKCS7(). However since this function is related to writing data we do not consider it security significan

CVSS3: 5.5
EPSS: Низкий
msrc логотип

CVE-2024-0727

больше 1 года назад

CVSS3: 5.5
EPSS: Низкий
debian логотип

CVE-2024-0727

больше 1 года назад

Issue summary: Processing a maliciously formatted PKCS12 file may lead ...

CVSS3: 5.5
EPSS: Низкий
oracle-oval логотип

ELSA-2024-28600

8 месяцев назад

ELSA-2024-28600: edk2 security update (MODERATE)

EPSS: Низкий
oracle-oval логотип

ELSA-2024-12842

7 месяцев назад

ELSA-2024-12842: edk2 security update (MODERATE)

EPSS: Низкий
oracle-oval логотип

ELSA-2024-12795

8 месяцев назад

ELSA-2024-12795: edk2 security update (MODERATE)

EPSS: Низкий
oracle-oval логотип

ELSA-2024-12794

8 месяцев назад

ELSA-2024-12794: edk2 security update (MODERATE)

EPSS: Низкий
oracle-oval логотип

ELSA-2024-12793

8 месяцев назад

ELSA-2024-12793: edk2 security update (MODERATE)

EPSS: Низкий
github логотип

GHSA-rj8q-prqp-jwfg

больше 1 года назад

Issue summary: The POLY1305 MAC (message authentication code) implementation contains a bug that might corrupt the internal state of applications running on PowerPC CPU based platforms if the CPU provides vector instructions. Impact summary: If an attacker can influence whether the POLY1305 MAC algorithm is used, the application state might be corrupted with various application dependent consequences. The POLY1305 MAC (message authentication code) implementation in OpenSSL for PowerPC CPUs restores the contents of vector registers in a different order than they are saved. Thus the contents of some of these vector registers are corrupted when returning to the caller. The vulnerable code is used only on newer PowerPC processors supporting the PowerISA 2.07 instructions. The consequences of this kind of internal application state corruption can be various - from no consequences, if the calling application does not depend on the contents of non-volatile XMM registers at all, to the w...

CVSS3: 6.5
EPSS: Низкий
fstec логотип

BDU:2024-02846

больше 1 года назад

Уязвимость реализации алгоритма POLY1305 MAC криптографической библиотеки OpenSSL, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 6.5
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:0842-1

больше 1 года назад

Security update for openssl

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:0841-1

больше 1 года назад

Security update for openssl1

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
redhat логотип
CVE-2023-6129

Issue summary: The POLY1305 MAC (message authentication code) implementation contains a bug that might corrupt the internal state of applications running on PowerPC CPU based platforms if the CPU provides vector instructions. Impact summary: If an attacker can influence whether the POLY1305 MAC algorithm is used, the application state might be corrupted with various application dependent consequences. The POLY1305 MAC (message authentication code) implementation in OpenSSL for PowerPC CPUs restores the contents of vector registers in a different order than they are saved. Thus the contents of some of these vector registers are corrupted when returning to the caller. The vulnerable code is used only on newer PowerPC processors supporting the PowerISA 2.07 instructions. The consequences of this kind of internal application state corruption can be various - from no consequences, if the calling application does not depend on the contents of non-volatile XMM registers at all, to the wors...

CVSS3: 6.5
2%
Низкий
больше 1 года назад
nvd логотип
CVE-2023-6129

Issue summary: The POLY1305 MAC (message authentication code) implementation contains a bug that might corrupt the internal state of applications running on PowerPC CPU based platforms if the CPU provides vector instructions. Impact summary: If an attacker can influence whether the POLY1305 MAC algorithm is used, the application state might be corrupted with various application dependent consequences. The POLY1305 MAC (message authentication code) implementation in OpenSSL for PowerPC CPUs restores the contents of vector registers in a different order than they are saved. Thus the contents of some of these vector registers are corrupted when returning to the caller. The vulnerable code is used only on newer PowerPC processors supporting the PowerISA 2.07 instructions. The consequences of this kind of internal application state corruption can be various - from no consequences, if the calling application does not depend on the contents of non-volatile XMM registers at all, to the wors

CVSS3: 6.5
2%
Низкий
больше 1 года назад
msrc логотип
CVSS3: 6.5
2%
Низкий
больше 1 года назад
debian логотип
CVE-2023-6129

Issue summary: The POLY1305 MAC (message authentication code) implemen ...

CVSS3: 6.5
2%
Низкий
больше 1 года назад
rocky логотип
RLSA-2024:5297

Moderate: edk2 security update

около 1 месяца назад
oracle-oval логотип
ELSA-2024-5297

ELSA-2024-5297: edk2 security update (MODERATE)

10 месяцев назад
ubuntu логотип
CVE-2024-0727

Issue summary: Processing a maliciously formatted PKCS12 file may lead OpenSSL to crash leading to a potential Denial of Service attack Impact summary: Applications loading files in the PKCS12 format from untrusted sources might terminate abruptly. A file in PKCS12 format can contain certificates and keys and may come from an untrusted source. The PKCS12 specification allows certain fields to be NULL, but OpenSSL does not correctly check for this case. This can lead to a NULL pointer dereference that results in OpenSSL crashing. If an application processes PKCS12 files from an untrusted source using the OpenSSL APIs then that application will be vulnerable to this issue. OpenSSL APIs that are vulnerable to this are: PKCS12_parse(), PKCS12_unpack_p7data(), PKCS12_unpack_p7encdata(), PKCS12_unpack_authsafes() and PKCS12_newpass(). We have also fixed a similar issue in SMIME_write_PKCS7(). However since this function is related to writing data we do not consider it security significant...

CVSS3: 5.5
0%
Низкий
больше 1 года назад
redhat логотип
CVE-2024-0727

Issue summary: Processing a maliciously formatted PKCS12 file may lead OpenSSL to crash leading to a potential Denial of Service attack Impact summary: Applications loading files in the PKCS12 format from untrusted sources might terminate abruptly. A file in PKCS12 format can contain certificates and keys and may come from an untrusted source. The PKCS12 specification allows certain fields to be NULL, but OpenSSL does not correctly check for this case. This can lead to a NULL pointer dereference that results in OpenSSL crashing. If an application processes PKCS12 files from an untrusted source using the OpenSSL APIs then that application will be vulnerable to this issue. OpenSSL APIs that are vulnerable to this are: PKCS12_parse(), PKCS12_unpack_p7data(), PKCS12_unpack_p7encdata(), PKCS12_unpack_authsafes() and PKCS12_newpass(). We have also fixed a similar issue in SMIME_write_PKCS7(). However since this function is related to writing data we do not consider it security significant...

CVSS3: 5.5
0%
Низкий
больше 1 года назад
nvd логотип
CVE-2024-0727

Issue summary: Processing a maliciously formatted PKCS12 file may lead OpenSSL to crash leading to a potential Denial of Service attack Impact summary: Applications loading files in the PKCS12 format from untrusted sources might terminate abruptly. A file in PKCS12 format can contain certificates and keys and may come from an untrusted source. The PKCS12 specification allows certain fields to be NULL, but OpenSSL does not correctly check for this case. This can lead to a NULL pointer dereference that results in OpenSSL crashing. If an application processes PKCS12 files from an untrusted source using the OpenSSL APIs then that application will be vulnerable to this issue. OpenSSL APIs that are vulnerable to this are: PKCS12_parse(), PKCS12_unpack_p7data(), PKCS12_unpack_p7encdata(), PKCS12_unpack_authsafes() and PKCS12_newpass(). We have also fixed a similar issue in SMIME_write_PKCS7(). However since this function is related to writing data we do not consider it security significan

CVSS3: 5.5
0%
Низкий
больше 1 года назад
msrc логотип
CVSS3: 5.5
0%
Низкий
больше 1 года назад
debian логотип
CVE-2024-0727

Issue summary: Processing a maliciously formatted PKCS12 file may lead ...

CVSS3: 5.5
0%
Низкий
больше 1 года назад
oracle-oval логотип
ELSA-2024-28600

ELSA-2024-28600: edk2 security update (MODERATE)

8 месяцев назад
oracle-oval логотип
ELSA-2024-12842

ELSA-2024-12842: edk2 security update (MODERATE)

7 месяцев назад
oracle-oval логотип
ELSA-2024-12795

ELSA-2024-12795: edk2 security update (MODERATE)

8 месяцев назад
oracle-oval логотип
ELSA-2024-12794

ELSA-2024-12794: edk2 security update (MODERATE)

8 месяцев назад
oracle-oval логотип
ELSA-2024-12793

ELSA-2024-12793: edk2 security update (MODERATE)

8 месяцев назад
github логотип
GHSA-rj8q-prqp-jwfg

Issue summary: The POLY1305 MAC (message authentication code) implementation contains a bug that might corrupt the internal state of applications running on PowerPC CPU based platforms if the CPU provides vector instructions. Impact summary: If an attacker can influence whether the POLY1305 MAC algorithm is used, the application state might be corrupted with various application dependent consequences. The POLY1305 MAC (message authentication code) implementation in OpenSSL for PowerPC CPUs restores the contents of vector registers in a different order than they are saved. Thus the contents of some of these vector registers are corrupted when returning to the caller. The vulnerable code is used only on newer PowerPC processors supporting the PowerISA 2.07 instructions. The consequences of this kind of internal application state corruption can be various - from no consequences, if the calling application does not depend on the contents of non-volatile XMM registers at all, to the w...

CVSS3: 6.5
2%
Низкий
больше 1 года назад
fstec логотип
BDU:2024-02846

Уязвимость реализации алгоритма POLY1305 MAC криптографической библиотеки OpenSSL, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 6.5
2%
Низкий
больше 1 года назад
suse-cvrf логотип
SUSE-SU-2024:0842-1

Security update for openssl

0%
Низкий
больше 1 года назад
suse-cvrf логотип
SUSE-SU-2024:0841-1

Security update for openssl1

0%
Низкий
больше 1 года назад

Уязвимостей на страницу