Логотип exploitDog
bind:"CVE-2021-3711"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2021-3711"

Количество 17

Количество 17

ubuntu логотип

CVE-2021-3711

почти 4 года назад

In order to decrypt SM2 encrypted data an application is expected to call the API function EVP_PKEY_decrypt(). Typically an application will call this function twice. The first time, on entry, the "out" parameter can be NULL and, on exit, the "outlen" parameter is populated with the buffer size required to hold the decrypted plaintext. The application can then allocate a sufficiently sized buffer and call EVP_PKEY_decrypt() again, but this time passing a non-NULL value for the "out" parameter. A bug in the implementation of the SM2 decryption code means that the calculation of the buffer size required to hold the plaintext returned by the first call to EVP_PKEY_decrypt() can be smaller than the actual size required by the second call. This can lead to a buffer overflow when EVP_PKEY_decrypt() is called by the application a second time with a buffer that is too small. A malicious attacker who is able present SM2 content for decryption to an application could cause attacker chosen dat...

CVSS3: 9.8
EPSS: Низкий
redhat логотип

CVE-2021-3711

почти 4 года назад

In order to decrypt SM2 encrypted data an application is expected to call the API function EVP_PKEY_decrypt(). Typically an application will call this function twice. The first time, on entry, the "out" parameter can be NULL and, on exit, the "outlen" parameter is populated with the buffer size required to hold the decrypted plaintext. The application can then allocate a sufficiently sized buffer and call EVP_PKEY_decrypt() again, but this time passing a non-NULL value for the "out" parameter. A bug in the implementation of the SM2 decryption code means that the calculation of the buffer size required to hold the plaintext returned by the first call to EVP_PKEY_decrypt() can be smaller than the actual size required by the second call. This can lead to a buffer overflow when EVP_PKEY_decrypt() is called by the application a second time with a buffer that is too small. A malicious attacker who is able present SM2 content for decryption to an application could cause attacker chosen dat...

CVSS3: 9.8
EPSS: Низкий
nvd логотип

CVE-2021-3711

почти 4 года назад

In order to decrypt SM2 encrypted data an application is expected to call the API function EVP_PKEY_decrypt(). Typically an application will call this function twice. The first time, on entry, the "out" parameter can be NULL and, on exit, the "outlen" parameter is populated with the buffer size required to hold the decrypted plaintext. The application can then allocate a sufficiently sized buffer and call EVP_PKEY_decrypt() again, but this time passing a non-NULL value for the "out" parameter. A bug in the implementation of the SM2 decryption code means that the calculation of the buffer size required to hold the plaintext returned by the first call to EVP_PKEY_decrypt() can be smaller than the actual size required by the second call. This can lead to a buffer overflow when EVP_PKEY_decrypt() is called by the application a second time with a buffer that is too small. A malicious attacker who is able present SM2 content for decryption to an application could cause attacker chosen data t

CVSS3: 9.8
EPSS: Низкий
msrc логотип

CVE-2021-3711

больше 3 лет назад

OpenSSL: CVE-2021-3711 SM2 Decryption Buffer Overflow

EPSS: Низкий
debian логотип

CVE-2021-3711

почти 4 года назад

In order to decrypt SM2 encrypted data an application is expected to c ...

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-5ww6-px42-wc85

около 3 лет назад

SM2 Decryption Buffer Overflow

CVSS3: 9.8
EPSS: Низкий
fstec логотип

BDU:2021-04570

почти 4 года назад

Уязвимость реализации криптографического алгоритма SM2 библиотеки OpenSSL, позволяющая нарушителю выполнить произвольный код

CVSS3: 9.8
EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2021:2830-1

почти 4 года назад

Security update for openssl-1_1

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2021:1188-1

почти 4 года назад

Security update for openssl-1_1

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:2833-1

почти 4 года назад

Security update for openssl-1_1

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:2830-1

почти 4 года назад

Security update for openssl-1_1

EPSS: Низкий
redos логотип

ROS-20240412-06

около 1 года назад

Множественные уязвимости etcd

CVSS3: 9.8
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:4437-1

больше 2 лет назад

Security update for SUSE Manager Client Tools

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:4428-1

больше 2 лет назад

Security update for grafana

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:1396-1

около 3 лет назад

Security update for SUSE Manager Client Tools

EPSS: Низкий
suse-cvrf логотип

SUSE-FU-2022:1419-1

около 3 лет назад

Feature update for grafana

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:2134-1

почти 3 года назад

Security update for SUSE Manager Client Tools

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2021-3711

In order to decrypt SM2 encrypted data an application is expected to call the API function EVP_PKEY_decrypt(). Typically an application will call this function twice. The first time, on entry, the "out" parameter can be NULL and, on exit, the "outlen" parameter is populated with the buffer size required to hold the decrypted plaintext. The application can then allocate a sufficiently sized buffer and call EVP_PKEY_decrypt() again, but this time passing a non-NULL value for the "out" parameter. A bug in the implementation of the SM2 decryption code means that the calculation of the buffer size required to hold the plaintext returned by the first call to EVP_PKEY_decrypt() can be smaller than the actual size required by the second call. This can lead to a buffer overflow when EVP_PKEY_decrypt() is called by the application a second time with a buffer that is too small. A malicious attacker who is able present SM2 content for decryption to an application could cause attacker chosen dat...

CVSS3: 9.8
3%
Низкий
почти 4 года назад
redhat логотип
CVE-2021-3711

In order to decrypt SM2 encrypted data an application is expected to call the API function EVP_PKEY_decrypt(). Typically an application will call this function twice. The first time, on entry, the "out" parameter can be NULL and, on exit, the "outlen" parameter is populated with the buffer size required to hold the decrypted plaintext. The application can then allocate a sufficiently sized buffer and call EVP_PKEY_decrypt() again, but this time passing a non-NULL value for the "out" parameter. A bug in the implementation of the SM2 decryption code means that the calculation of the buffer size required to hold the plaintext returned by the first call to EVP_PKEY_decrypt() can be smaller than the actual size required by the second call. This can lead to a buffer overflow when EVP_PKEY_decrypt() is called by the application a second time with a buffer that is too small. A malicious attacker who is able present SM2 content for decryption to an application could cause attacker chosen dat...

CVSS3: 9.8
3%
Низкий
почти 4 года назад
nvd логотип
CVE-2021-3711

In order to decrypt SM2 encrypted data an application is expected to call the API function EVP_PKEY_decrypt(). Typically an application will call this function twice. The first time, on entry, the "out" parameter can be NULL and, on exit, the "outlen" parameter is populated with the buffer size required to hold the decrypted plaintext. The application can then allocate a sufficiently sized buffer and call EVP_PKEY_decrypt() again, but this time passing a non-NULL value for the "out" parameter. A bug in the implementation of the SM2 decryption code means that the calculation of the buffer size required to hold the plaintext returned by the first call to EVP_PKEY_decrypt() can be smaller than the actual size required by the second call. This can lead to a buffer overflow when EVP_PKEY_decrypt() is called by the application a second time with a buffer that is too small. A malicious attacker who is able present SM2 content for decryption to an application could cause attacker chosen data t

CVSS3: 9.8
3%
Низкий
почти 4 года назад
msrc логотип
CVE-2021-3711

OpenSSL: CVE-2021-3711 SM2 Decryption Buffer Overflow

3%
Низкий
больше 3 лет назад
debian логотип
CVE-2021-3711

In order to decrypt SM2 encrypted data an application is expected to c ...

CVSS3: 9.8
3%
Низкий
почти 4 года назад
github логотип
GHSA-5ww6-px42-wc85

SM2 Decryption Buffer Overflow

CVSS3: 9.8
3%
Низкий
около 3 лет назад
fstec логотип
BDU:2021-04570

Уязвимость реализации криптографического алгоритма SM2 библиотеки OpenSSL, позволяющая нарушителю выполнить произвольный код

CVSS3: 9.8
3%
Низкий
почти 4 года назад
suse-cvrf логотип
openSUSE-SU-2021:2830-1

Security update for openssl-1_1

почти 4 года назад
suse-cvrf логотип
openSUSE-SU-2021:1188-1

Security update for openssl-1_1

почти 4 года назад
suse-cvrf логотип
SUSE-SU-2021:2833-1

Security update for openssl-1_1

почти 4 года назад
suse-cvrf логотип
SUSE-SU-2021:2830-1

Security update for openssl-1_1

почти 4 года назад
redos логотип
ROS-20240412-06

Множественные уязвимости etcd

CVSS3: 9.8
около 1 года назад
suse-cvrf логотип
SUSE-SU-2022:4437-1

Security update for SUSE Manager Client Tools

больше 2 лет назад
suse-cvrf логотип
SUSE-SU-2022:4428-1

Security update for grafana

больше 2 лет назад
suse-cvrf логотип
SUSE-SU-2022:1396-1

Security update for SUSE Manager Client Tools

около 3 лет назад
suse-cvrf логотип
SUSE-FU-2022:1419-1

Feature update for grafana

около 3 лет назад
suse-cvrf логотип
SUSE-SU-2022:2134-1

Security update for SUSE Manager Client Tools

почти 3 года назад

Уязвимостей на страницу