Количество 34
Количество 34

BDU:2019-00186
Уязвимость библиотеки OpenSSL, связанная с ошибками обработки криптографических ключей при использовании протокола DH (E), позволяющая нарушителю вызвать отказ в обслуживании

CVE-2018-0732
During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will cause the client to spend an unreasonably long period of time generating a key for this prime resulting in a hang until the client has finished. This could be exploited in a Denial Of Service attack. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2-1.0.2o).

CVE-2018-0732
During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will cause the client to spend an unreasonably long period of time generating a key for this prime resulting in a hang until the client has finished. This could be exploited in a Denial Of Service attack. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2-1.0.2o).

CVE-2018-0732
During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will cause the client to spend an unreasonably long period of time generating a key for this prime resulting in a hang until the client has finished. This could be exploited in a Denial Of Service attack. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2-1.0.2o).
CVE-2018-0732
During key agreement in a TLS handshake using a DH(E) based ciphersuit ...

openSUSE-SU-2018:3013-1
Security update for openssl-1_1

openSUSE-SU-2018:2129-1
Security update for openssl-1_0_0

openSUSE-SU-2018:2117-1
Security update for openssl-1_1

openSUSE-SU-2018:1906-1
Security update for openssl

SUSE-SU-2018:2956-1
Security update for openssl-1_1

SUSE-SU-2018:2207-1
Security update for openssl

SUSE-SU-2018:2041-1
Security update for openssl-1_1

SUSE-SU-2018:2036-1
Security update for openssl-1_1

SUSE-SU-2018:1968-1
Security update for openssl

SUSE-SU-2018:1887-2
Security update for openssl

SUSE-SU-2018:1887-1
Security update for openssl
GHSA-497c-86pp-222m
During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will cause the client to spend an unreasonably long period of time generating a key for this prime resulting in a hang until the client has finished. This could be exploited in a Denial Of Service attack. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2-1.0.2o).

openSUSE-SU-2018:3015-1
Security update for openssl-1_0_0

openSUSE-SU-2018:2855-1
Security update for nodejs8

openSUSE-SU-2018:2816-1
Security update for nodejs6
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | BDU:2019-00186 Уязвимость библиотеки OpenSSL, связанная с ошибками обработки криптографических ключей при использовании протокола DH (E), позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 7.5 | 81% Высокий | около 7 лет назад |
![]() | CVE-2018-0732 During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will cause the client to spend an unreasonably long period of time generating a key for this prime resulting in a hang until the client has finished. This could be exploited in a Denial Of Service attack. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2-1.0.2o). | CVSS3: 7.5 | 81% Высокий | около 7 лет назад |
![]() | CVE-2018-0732 During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will cause the client to spend an unreasonably long period of time generating a key for this prime resulting in a hang until the client has finished. This could be exploited in a Denial Of Service attack. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2-1.0.2o). | CVSS3: 4.3 | 81% Высокий | около 7 лет назад |
![]() | CVE-2018-0732 During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will cause the client to spend an unreasonably long period of time generating a key for this prime resulting in a hang until the client has finished. This could be exploited in a Denial Of Service attack. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2-1.0.2o). | CVSS3: 7.5 | 81% Высокий | около 7 лет назад |
CVE-2018-0732 During key agreement in a TLS handshake using a DH(E) based ciphersuit ... | CVSS3: 7.5 | 81% Высокий | около 7 лет назад | |
![]() | openSUSE-SU-2018:3013-1 Security update for openssl-1_1 | 81% Высокий | больше 6 лет назад | |
![]() | openSUSE-SU-2018:2129-1 Security update for openssl-1_0_0 | 81% Высокий | почти 7 лет назад | |
![]() | openSUSE-SU-2018:2117-1 Security update for openssl-1_1 | 81% Высокий | почти 7 лет назад | |
![]() | openSUSE-SU-2018:1906-1 Security update for openssl | 81% Высокий | почти 7 лет назад | |
![]() | SUSE-SU-2018:2956-1 Security update for openssl-1_1 | 81% Высокий | больше 6 лет назад | |
![]() | SUSE-SU-2018:2207-1 Security update for openssl | 81% Высокий | почти 7 лет назад | |
![]() | SUSE-SU-2018:2041-1 Security update for openssl-1_1 | 81% Высокий | почти 7 лет назад | |
![]() | SUSE-SU-2018:2036-1 Security update for openssl-1_1 | 81% Высокий | почти 7 лет назад | |
![]() | SUSE-SU-2018:1968-1 Security update for openssl | 81% Высокий | почти 7 лет назад | |
![]() | SUSE-SU-2018:1887-2 Security update for openssl | 81% Высокий | больше 6 лет назад | |
![]() | SUSE-SU-2018:1887-1 Security update for openssl | 81% Высокий | почти 7 лет назад | |
GHSA-497c-86pp-222m During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will cause the client to spend an unreasonably long period of time generating a key for this prime resulting in a hang until the client has finished. This could be exploited in a Denial Of Service attack. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2-1.0.2o). | CVSS3: 7.5 | 81% Высокий | около 3 лет назад | |
![]() | openSUSE-SU-2018:3015-1 Security update for openssl-1_0_0 | больше 6 лет назад | ||
![]() | openSUSE-SU-2018:2855-1 Security update for nodejs8 | больше 6 лет назад | ||
![]() | openSUSE-SU-2018:2816-1 Security update for nodejs6 | больше 6 лет назад |
Уязвимостей на страницу