Количество 20
Количество 20

CVE-2017-3731
If an SSL/TLS server or client is running on a 32-bit host, and a specific cipher is being used, then a truncated packet can cause that server or client to perform an out-of-bounds read, usually resulting in a crash. For OpenSSL 1.1.0, the crash can be triggered when using CHACHA20/POLY1305; users should upgrade to 1.1.0d. For Openssl 1.0.2, the crash can be triggered when using RC4-MD5; users who have not disabled that algorithm should update to 1.0.2k.

CVE-2017-3731
If an SSL/TLS server or client is running on a 32-bit host, and a specific cipher is being used, then a truncated packet can cause that server or client to perform an out-of-bounds read, usually resulting in a crash. For OpenSSL 1.1.0, the crash can be triggered when using CHACHA20/POLY1305; users should upgrade to 1.1.0d. For Openssl 1.0.2, the crash can be triggered when using RC4-MD5; users who have not disabled that algorithm should update to 1.0.2k.

CVE-2017-3731
If an SSL/TLS server or client is running on a 32-bit host, and a specific cipher is being used, then a truncated packet can cause that server or client to perform an out-of-bounds read, usually resulting in a crash. For OpenSSL 1.1.0, the crash can be triggered when using CHACHA20/POLY1305; users should upgrade to 1.1.0d. For Openssl 1.0.2, the crash can be triggered when using RC4-MD5; users who have not disabled that algorithm should update to 1.0.2k.
CVE-2017-3731
If an SSL/TLS server or client is running on a 32-bit host, and a spec ...
GHSA-3cp9-4w64-73cg
If an SSL/TLS server or client is running on a 32-bit host, and a specific cipher is being used, then a truncated packet can cause that server or client to perform an out-of-bounds read, usually resulting in a crash. For OpenSSL 1.1.0, the crash can be triggered when using CHACHA20/POLY1305; users should upgrade to 1.1.0d. For Openssl 1.0.2, the crash can be triggered when using RC4-MD5; users who have not disabled that algorithm should update to 1.0.2k.

BDU:2020-02909
Уязвимость библиотеки OpenSSL, связанная с чтением за границами буфера в памяти, позволяющая нарушителю вызвать отказ в обслуживании
ELSA-2017-0286
ELSA-2017-0286: openssl security update (MODERATE)

openSUSE-SU-2017:0941-1
Security update for nodejs4

openSUSE-SU-2017:0527-1
Security update for nodejs

openSUSE-SU-2017:0481-1
Security update for openssl

SUSE-SU-2017:0855-1
Security update for nodejs4

SUSE-SU-2017:0441-1
Security update for openssl

SUSE-SU-2017:0431-1
Security update for nodejs6

openSUSE-SU-2017:0487-1
Security update for openssl

SUSE-SU-2017:0495-1
Security update for openssl1

SUSE-SU-2017:0461-1
Security update for openssl

SUSE-SU-2018:0112-1
Security update for openssl

openSUSE-SU-2017:2868-1
Security update for mysql-community-server

openSUSE-SU-2018:0458-1
Security update for openssl-steam

SUSE-SU-2017:2700-1
Security update for SLES 12-SP1 Docker image
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2017-3731 If an SSL/TLS server or client is running on a 32-bit host, and a specific cipher is being used, then a truncated packet can cause that server or client to perform an out-of-bounds read, usually resulting in a crash. For OpenSSL 1.1.0, the crash can be triggered when using CHACHA20/POLY1305; users should upgrade to 1.1.0d. For Openssl 1.0.2, the crash can be triggered when using RC4-MD5; users who have not disabled that algorithm should update to 1.0.2k. | CVSS3: 7.5 | 15% Средний | около 8 лет назад |
![]() | CVE-2017-3731 If an SSL/TLS server or client is running on a 32-bit host, and a specific cipher is being used, then a truncated packet can cause that server or client to perform an out-of-bounds read, usually resulting in a crash. For OpenSSL 1.1.0, the crash can be triggered when using CHACHA20/POLY1305; users should upgrade to 1.1.0d. For Openssl 1.0.2, the crash can be triggered when using RC4-MD5; users who have not disabled that algorithm should update to 1.0.2k. | CVSS3: 5.9 | 15% Средний | больше 8 лет назад |
![]() | CVE-2017-3731 If an SSL/TLS server or client is running on a 32-bit host, and a specific cipher is being used, then a truncated packet can cause that server or client to perform an out-of-bounds read, usually resulting in a crash. For OpenSSL 1.1.0, the crash can be triggered when using CHACHA20/POLY1305; users should upgrade to 1.1.0d. For Openssl 1.0.2, the crash can be triggered when using RC4-MD5; users who have not disabled that algorithm should update to 1.0.2k. | CVSS3: 7.5 | 15% Средний | около 8 лет назад |
CVE-2017-3731 If an SSL/TLS server or client is running on a 32-bit host, and a spec ... | CVSS3: 7.5 | 15% Средний | около 8 лет назад | |
GHSA-3cp9-4w64-73cg If an SSL/TLS server or client is running on a 32-bit host, and a specific cipher is being used, then a truncated packet can cause that server or client to perform an out-of-bounds read, usually resulting in a crash. For OpenSSL 1.1.0, the crash can be triggered when using CHACHA20/POLY1305; users should upgrade to 1.1.0d. For Openssl 1.0.2, the crash can be triggered when using RC4-MD5; users who have not disabled that algorithm should update to 1.0.2k. | CVSS3: 7.5 | 15% Средний | около 3 лет назад | |
![]() | BDU:2020-02909 Уязвимость библиотеки OpenSSL, связанная с чтением за границами буфера в памяти, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 7.5 | 15% Средний | около 8 лет назад |
ELSA-2017-0286 ELSA-2017-0286: openssl security update (MODERATE) | больше 8 лет назад | |||
![]() | openSUSE-SU-2017:0941-1 Security update for nodejs4 | около 8 лет назад | ||
![]() | openSUSE-SU-2017:0527-1 Security update for nodejs | больше 8 лет назад | ||
![]() | openSUSE-SU-2017:0481-1 Security update for openssl | больше 8 лет назад | ||
![]() | SUSE-SU-2017:0855-1 Security update for nodejs4 | около 8 лет назад | ||
![]() | SUSE-SU-2017:0441-1 Security update for openssl | больше 8 лет назад | ||
![]() | SUSE-SU-2017:0431-1 Security update for nodejs6 | больше 8 лет назад | ||
![]() | openSUSE-SU-2017:0487-1 Security update for openssl | больше 8 лет назад | ||
![]() | SUSE-SU-2017:0495-1 Security update for openssl1 | больше 8 лет назад | ||
![]() | SUSE-SU-2017:0461-1 Security update for openssl | больше 8 лет назад | ||
![]() | SUSE-SU-2018:0112-1 Security update for openssl | больше 7 лет назад | ||
![]() | openSUSE-SU-2017:2868-1 Security update for mysql-community-server | больше 7 лет назад | ||
![]() | openSUSE-SU-2018:0458-1 Security update for openssl-steam | больше 7 лет назад | ||
![]() | SUSE-SU-2017:2700-1 Security update for SLES 12-SP1 Docker image | больше 7 лет назад |
Уязвимостей на страницу