Количество 34
Количество 34
GHSA-497c-86pp-222m
During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will cause the client to spend an unreasonably long period of time generating a key for this prime resulting in a hang until the client has finished. This could be exploited in a Denial Of Service attack. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2-1.0.2o).
CVE-2018-0732
During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will cause the client to spend an unreasonably long period of time generating a key for this prime resulting in a hang until the client has finished. This could be exploited in a Denial Of Service attack. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2-1.0.2o).
CVE-2018-0732
During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will cause the client to spend an unreasonably long period of time generating a key for this prime resulting in a hang until the client has finished. This could be exploited in a Denial Of Service attack. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2-1.0.2o).
CVE-2018-0732
During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will cause the client to spend an unreasonably long period of time generating a key for this prime resulting in a hang until the client has finished. This could be exploited in a Denial Of Service attack. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2-1.0.2o).
CVE-2018-0732
During key agreement in a TLS handshake using a DH(E) based ciphersuit ...
openSUSE-SU-2018:3013-1
Security update for openssl-1_1
openSUSE-SU-2018:2129-1
Security update for openssl-1_0_0
openSUSE-SU-2018:2117-1
Security update for openssl-1_1
openSUSE-SU-2018:1906-1
Security update for openssl
SUSE-SU-2018:2956-1
Security update for openssl-1_1
SUSE-SU-2018:2207-1
Security update for openssl
SUSE-SU-2018:2041-1
Security update for openssl-1_1
SUSE-SU-2018:2036-1
Security update for openssl-1_1
SUSE-SU-2018:1968-1
Security update for openssl
SUSE-SU-2018:1887-2
Security update for openssl
SUSE-SU-2018:1887-1
Security update for openssl
BDU:2019-00186
Уязвимость библиотеки OpenSSL, связанная с ошибками обработки криптографических ключей при использовании протокола DH (E), позволяющая нарушителю вызвать отказ в обслуживании
openSUSE-SU-2018:3015-1
Security update for openssl-1_0_0
openSUSE-SU-2018:2855-1
Security update for nodejs8
openSUSE-SU-2018:2816-1
Security update for nodejs6
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
GHSA-497c-86pp-222m During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will cause the client to spend an unreasonably long period of time generating a key for this prime resulting in a hang until the client has finished. This could be exploited in a Denial Of Service attack. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2-1.0.2o). | CVSS3: 7.5 | 59% Средний | больше 3 лет назад | |
CVE-2018-0732 During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will cause the client to spend an unreasonably long period of time generating a key for this prime resulting in a hang until the client has finished. This could be exploited in a Denial Of Service attack. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2-1.0.2o). | CVSS3: 7.5 | 59% Средний | больше 7 лет назад | |
CVE-2018-0732 During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will cause the client to spend an unreasonably long period of time generating a key for this prime resulting in a hang until the client has finished. This could be exploited in a Denial Of Service attack. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2-1.0.2o). | CVSS3: 4.3 | 59% Средний | больше 7 лет назад | |
CVE-2018-0732 During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will cause the client to spend an unreasonably long period of time generating a key for this prime resulting in a hang until the client has finished. This could be exploited in a Denial Of Service attack. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2-1.0.2o). | CVSS3: 7.5 | 59% Средний | больше 7 лет назад | |
CVE-2018-0732 During key agreement in a TLS handshake using a DH(E) based ciphersuit ... | CVSS3: 7.5 | 59% Средний | больше 7 лет назад | |
openSUSE-SU-2018:3013-1 Security update for openssl-1_1 | 59% Средний | около 7 лет назад | ||
openSUSE-SU-2018:2129-1 Security update for openssl-1_0_0 | 59% Средний | больше 7 лет назад | ||
openSUSE-SU-2018:2117-1 Security update for openssl-1_1 | 59% Средний | больше 7 лет назад | ||
openSUSE-SU-2018:1906-1 Security update for openssl | 59% Средний | больше 7 лет назад | ||
SUSE-SU-2018:2956-1 Security update for openssl-1_1 | 59% Средний | около 7 лет назад | ||
SUSE-SU-2018:2207-1 Security update for openssl | 59% Средний | около 7 лет назад | ||
SUSE-SU-2018:2041-1 Security update for openssl-1_1 | 59% Средний | больше 7 лет назад | ||
SUSE-SU-2018:2036-1 Security update for openssl-1_1 | 59% Средний | больше 7 лет назад | ||
SUSE-SU-2018:1968-1 Security update for openssl | 59% Средний | больше 7 лет назад | ||
SUSE-SU-2018:1887-2 Security update for openssl | 59% Средний | около 7 лет назад | ||
SUSE-SU-2018:1887-1 Security update for openssl | 59% Средний | больше 7 лет назад | ||
BDU:2019-00186 Уязвимость библиотеки OpenSSL, связанная с ошибками обработки криптографических ключей при использовании протокола DH (E), позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 7.5 | 59% Средний | больше 7 лет назад | |
openSUSE-SU-2018:3015-1 Security update for openssl-1_0_0 | около 7 лет назад | |||
openSUSE-SU-2018:2855-1 Security update for nodejs8 | около 7 лет назад | |||
openSUSE-SU-2018:2816-1 Security update for nodejs6 | около 7 лет назад |
Уязвимостей на страницу