Логотип exploitDog
bind:"BDU:2023-07691" OR bind:"CVE-2023-5363"
Консоль
Логотип exploitDog

exploitDog

bind:"BDU:2023-07691" OR bind:"CVE-2023-5363"

Количество 14

Количество 14

fstec логотип

BDU:2023-07691

больше 1 года назад

Уязвимость функций EVP_EncryptInit_ex2(), EVP_DecryptInit_ex2(), EVP_CipherInit_ex2() криптографической библиотеки OpenSSL, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

CVSS3: 7.5
EPSS: Низкий
redos логотип

ROS-20240409-06

около 1 года назад

Множественные уязвимости salt

CVSS3: 7.8
EPSS: Низкий
ubuntu логотип

CVE-2023-5363

больше 1 года назад

Issue summary: A bug has been identified in the processing of key and initialisation vector (IV) lengths. This can lead to potential truncation or overruns during the initialisation of some symmetric ciphers. Impact summary: A truncation in the IV can result in non-uniqueness, which could result in loss of confidentiality for some cipher modes. When calling EVP_EncryptInit_ex2(), EVP_DecryptInit_ex2() or EVP_CipherInit_ex2() the provided OSSL_PARAM array is processed after the key and IV have been established. Any alterations to the key length, via the "keylen" parameter or the IV length, via the "ivlen" parameter, within the OSSL_PARAM array will not take effect as intended, potentially causing truncation or overreading of these values. The following ciphers and cipher modes are impacted: RC2, RC4, RC5, CCM, GCM and OCB. For the CCM, GCM and OCB cipher modes, truncation of the IV can result in loss of confidentiality. For example, when following NIST's SP 800-38D section 8.2.1 guid...

CVSS3: 7.5
EPSS: Низкий
redhat логотип

CVE-2023-5363

больше 1 года назад

Issue summary: A bug has been identified in the processing of key and initialisation vector (IV) lengths. This can lead to potential truncation or overruns during the initialisation of some symmetric ciphers. Impact summary: A truncation in the IV can result in non-uniqueness, which could result in loss of confidentiality for some cipher modes. When calling EVP_EncryptInit_ex2(), EVP_DecryptInit_ex2() or EVP_CipherInit_ex2() the provided OSSL_PARAM array is processed after the key and IV have been established. Any alterations to the key length, via the "keylen" parameter or the IV length, via the "ivlen" parameter, within the OSSL_PARAM array will not take effect as intended, potentially causing truncation or overreading of these values. The following ciphers and cipher modes are impacted: RC2, RC4, RC5, CCM, GCM and OCB. For the CCM, GCM and OCB cipher modes, truncation of the IV can result in loss of confidentiality. For example, when following NIST's SP 800-38D section 8.2.1 ...

CVSS3: 7.5
EPSS: Низкий
nvd логотип

CVE-2023-5363

больше 1 года назад

Issue summary: A bug has been identified in the processing of key and initialisation vector (IV) lengths. This can lead to potential truncation or overruns during the initialisation of some symmetric ciphers. Impact summary: A truncation in the IV can result in non-uniqueness, which could result in loss of confidentiality for some cipher modes. When calling EVP_EncryptInit_ex2(), EVP_DecryptInit_ex2() or EVP_CipherInit_ex2() the provided OSSL_PARAM array is processed after the key and IV have been established. Any alterations to the key length, via the "keylen" parameter or the IV length, via the "ivlen" parameter, within the OSSL_PARAM array will not take effect as intended, potentially causing truncation or overreading of these values. The following ciphers and cipher modes are impacted: RC2, RC4, RC5, CCM, GCM and OCB. For the CCM, GCM and OCB cipher modes, truncation of the IV can result in loss of confidentiality. For example, when following NIST's SP 800-38D section 8.2.1

CVSS3: 7.5
EPSS: Низкий
msrc логотип

CVE-2023-5363

больше 1 года назад

CVSS3: 7.5
EPSS: Низкий
debian логотип

CVE-2023-5363

больше 1 года назад

Issue summary: A bug has been identified in the processing of key and ...

CVSS3: 7.5
EPSS: Низкий
redos логотип

ROS-20231110-02

больше 1 года назад

Уязвимость OpenSSL

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-xw78-pcr6-wrg8

больше 1 года назад

Issue summary: A bug has been identified in the processing of key and initialisation vector (IV) lengths. This can lead to potential truncation or overruns during the initialisation of some symmetric ciphers. Impact summary: A truncation in the IV can result in non-uniqueness, which could result in loss of confidentiality for some cipher modes. When calling EVP_EncryptInit_ex2(), EVP_DecryptInit_ex2() or EVP_CipherInit_ex2() the provided OSSL_PARAM array is processed after the key and IV have been established. Any alterations to the key length, via the "keylen" parameter or the IV length, via the "ivlen" parameter, within the OSSL_PARAM array will not take effect as intended, potentially causing truncation or overreading of these values. The following ciphers and cipher modes are impacted: RC2, RC4, RC5, CCM, GCM and OCB. For the CCM, GCM and OCB cipher modes, truncation of the IV can result in loss of confidentiality. For example, when following NIST's SP 800-38D section 8.2...

CVSS3: 7.5
EPSS: Низкий
oracle-oval логотип

ELSA-2024-12093

больше 1 года назад

ELSA-2024-12093: openssl security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2024-0310

больше 1 года назад

ELSA-2024-0310: openssl security update (MODERATE)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:4190-1

больше 1 года назад

Security update for openssl-3

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:4189-1

больше 1 года назад

Security update for openssl-3

EPSS: Низкий
redos логотип

ROS-20231109-01

больше 1 года назад

Множественные уязвимости golang

CVSS3: 9.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
fstec логотип
BDU:2023-07691

Уязвимость функций EVP_EncryptInit_ex2(), EVP_DecryptInit_ex2(), EVP_CipherInit_ex2() криптографической библиотеки OpenSSL, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

CVSS3: 7.5
2%
Низкий
больше 1 года назад
redos логотип
ROS-20240409-06

Множественные уязвимости salt

CVSS3: 7.8
около 1 года назад
ubuntu логотип
CVE-2023-5363

Issue summary: A bug has been identified in the processing of key and initialisation vector (IV) lengths. This can lead to potential truncation or overruns during the initialisation of some symmetric ciphers. Impact summary: A truncation in the IV can result in non-uniqueness, which could result in loss of confidentiality for some cipher modes. When calling EVP_EncryptInit_ex2(), EVP_DecryptInit_ex2() or EVP_CipherInit_ex2() the provided OSSL_PARAM array is processed after the key and IV have been established. Any alterations to the key length, via the "keylen" parameter or the IV length, via the "ivlen" parameter, within the OSSL_PARAM array will not take effect as intended, potentially causing truncation or overreading of these values. The following ciphers and cipher modes are impacted: RC2, RC4, RC5, CCM, GCM and OCB. For the CCM, GCM and OCB cipher modes, truncation of the IV can result in loss of confidentiality. For example, when following NIST's SP 800-38D section 8.2.1 guid...

CVSS3: 7.5
2%
Низкий
больше 1 года назад
redhat логотип
CVE-2023-5363

Issue summary: A bug has been identified in the processing of key and initialisation vector (IV) lengths. This can lead to potential truncation or overruns during the initialisation of some symmetric ciphers. Impact summary: A truncation in the IV can result in non-uniqueness, which could result in loss of confidentiality for some cipher modes. When calling EVP_EncryptInit_ex2(), EVP_DecryptInit_ex2() or EVP_CipherInit_ex2() the provided OSSL_PARAM array is processed after the key and IV have been established. Any alterations to the key length, via the "keylen" parameter or the IV length, via the "ivlen" parameter, within the OSSL_PARAM array will not take effect as intended, potentially causing truncation or overreading of these values. The following ciphers and cipher modes are impacted: RC2, RC4, RC5, CCM, GCM and OCB. For the CCM, GCM and OCB cipher modes, truncation of the IV can result in loss of confidentiality. For example, when following NIST's SP 800-38D section 8.2.1 ...

CVSS3: 7.5
2%
Низкий
больше 1 года назад
nvd логотип
CVE-2023-5363

Issue summary: A bug has been identified in the processing of key and initialisation vector (IV) lengths. This can lead to potential truncation or overruns during the initialisation of some symmetric ciphers. Impact summary: A truncation in the IV can result in non-uniqueness, which could result in loss of confidentiality for some cipher modes. When calling EVP_EncryptInit_ex2(), EVP_DecryptInit_ex2() or EVP_CipherInit_ex2() the provided OSSL_PARAM array is processed after the key and IV have been established. Any alterations to the key length, via the "keylen" parameter or the IV length, via the "ivlen" parameter, within the OSSL_PARAM array will not take effect as intended, potentially causing truncation or overreading of these values. The following ciphers and cipher modes are impacted: RC2, RC4, RC5, CCM, GCM and OCB. For the CCM, GCM and OCB cipher modes, truncation of the IV can result in loss of confidentiality. For example, when following NIST's SP 800-38D section 8.2.1

CVSS3: 7.5
2%
Низкий
больше 1 года назад
msrc логотип
CVSS3: 7.5
2%
Низкий
больше 1 года назад
debian логотип
CVE-2023-5363

Issue summary: A bug has been identified in the processing of key and ...

CVSS3: 7.5
2%
Низкий
больше 1 года назад
redos логотип
ROS-20231110-02

Уязвимость OpenSSL

CVSS3: 7.5
2%
Низкий
больше 1 года назад
github логотип
GHSA-xw78-pcr6-wrg8

Issue summary: A bug has been identified in the processing of key and initialisation vector (IV) lengths. This can lead to potential truncation or overruns during the initialisation of some symmetric ciphers. Impact summary: A truncation in the IV can result in non-uniqueness, which could result in loss of confidentiality for some cipher modes. When calling EVP_EncryptInit_ex2(), EVP_DecryptInit_ex2() or EVP_CipherInit_ex2() the provided OSSL_PARAM array is processed after the key and IV have been established. Any alterations to the key length, via the "keylen" parameter or the IV length, via the "ivlen" parameter, within the OSSL_PARAM array will not take effect as intended, potentially causing truncation or overreading of these values. The following ciphers and cipher modes are impacted: RC2, RC4, RC5, CCM, GCM and OCB. For the CCM, GCM and OCB cipher modes, truncation of the IV can result in loss of confidentiality. For example, when following NIST's SP 800-38D section 8.2...

CVSS3: 7.5
2%
Низкий
больше 1 года назад
oracle-oval логотип
ELSA-2024-12093

ELSA-2024-12093: openssl security update (IMPORTANT)

больше 1 года назад
oracle-oval логотип
ELSA-2024-0310

ELSA-2024-0310: openssl security update (MODERATE)

больше 1 года назад
suse-cvrf логотип
SUSE-SU-2023:4190-1

Security update for openssl-3

больше 1 года назад
suse-cvrf логотип
SUSE-SU-2023:4189-1

Security update for openssl-3

больше 1 года назад
redos логотип
ROS-20231109-01

Множественные уязвимости golang

CVSS3: 9.8
больше 1 года назад

Уязвимостей на страницу