Логотип exploitDog
bind:"GHSA-5ww6-px42-wc85" OR bind:"CVE-2021-3711"
Консоль
Логотип exploitDog

exploitDog

bind:"GHSA-5ww6-px42-wc85" OR bind:"CVE-2021-3711"

Количество 18

Количество 18

github логотип

GHSA-5ww6-px42-wc85

больше 3 лет назад

SM2 Decryption Buffer Overflow

CVSS3: 9.8
EPSS: Низкий
ubuntu логотип

CVE-2021-3711

около 4 лет назад

In order to decrypt SM2 encrypted data an application is expected to call the API function EVP_PKEY_decrypt(). Typically an application will call this function twice. The first time, on entry, the "out" parameter can be NULL and, on exit, the "outlen" parameter is populated with the buffer size required to hold the decrypted plaintext. The application can then allocate a sufficiently sized buffer and call EVP_PKEY_decrypt() again, but this time passing a non-NULL value for the "out" parameter. A bug in the implementation of the SM2 decryption code means that the calculation of the buffer size required to hold the plaintext returned by the first call to EVP_PKEY_decrypt() can be smaller than the actual size required by the second call. This can lead to a buffer overflow when EVP_PKEY_decrypt() is called by the application a second time with a buffer that is too small. A malicious attacker who is able present SM2 content for decryption to an application could cause attacker chosen dat...

CVSS3: 9.8
EPSS: Низкий
redhat логотип

CVE-2021-3711

около 4 лет назад

In order to decrypt SM2 encrypted data an application is expected to call the API function EVP_PKEY_decrypt(). Typically an application will call this function twice. The first time, on entry, the "out" parameter can be NULL and, on exit, the "outlen" parameter is populated with the buffer size required to hold the decrypted plaintext. The application can then allocate a sufficiently sized buffer and call EVP_PKEY_decrypt() again, but this time passing a non-NULL value for the "out" parameter. A bug in the implementation of the SM2 decryption code means that the calculation of the buffer size required to hold the plaintext returned by the first call to EVP_PKEY_decrypt() can be smaller than the actual size required by the second call. This can lead to a buffer overflow when EVP_PKEY_decrypt() is called by the application a second time with a buffer that is too small. A malicious attacker who is able present SM2 content for decryption to an application could cause attacker chosen dat...

CVSS3: 9.8
EPSS: Низкий
nvd логотип

CVE-2021-3711

около 4 лет назад

In order to decrypt SM2 encrypted data an application is expected to call the API function EVP_PKEY_decrypt(). Typically an application will call this function twice. The first time, on entry, the "out" parameter can be NULL and, on exit, the "outlen" parameter is populated with the buffer size required to hold the decrypted plaintext. The application can then allocate a sufficiently sized buffer and call EVP_PKEY_decrypt() again, but this time passing a non-NULL value for the "out" parameter. A bug in the implementation of the SM2 decryption code means that the calculation of the buffer size required to hold the plaintext returned by the first call to EVP_PKEY_decrypt() can be smaller than the actual size required by the second call. This can lead to a buffer overflow when EVP_PKEY_decrypt() is called by the application a second time with a buffer that is too small. A malicious attacker who is able present SM2 content for decryption to an application could cause attacker chosen data t

CVSS3: 9.8
EPSS: Низкий
msrc логотип

CVE-2021-3711

почти 4 года назад

OpenSSL: CVE-2021-3711 SM2 Decryption Buffer Overflow

EPSS: Низкий
debian логотип

CVE-2021-3711

около 4 лет назад

In order to decrypt SM2 encrypted data an application is expected to c ...

CVSS3: 9.8
EPSS: Низкий
fstec логотип

BDU:2021-04570

около 4 лет назад

Уязвимость реализации криптографического алгоритма SM2 библиотеки OpenSSL, позволяющая нарушителю выполнить произвольный код

CVSS3: 9.8
EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2021:2830-1

около 4 лет назад

Security update for openssl-1_1

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2021:1188-1

около 4 лет назад

Security update for openssl-1_1

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:2833-1

около 4 лет назад

Security update for openssl-1_1

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:2830-1

около 4 лет назад

Security update for openssl-1_1

EPSS: Низкий
redos логотип

ROS-20240412-06

больше 1 года назад

Множественные уязвимости etcd

CVSS3: 9.8
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:4437-1

почти 3 года назад

Security update for SUSE Manager Client Tools

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:4428-1

почти 3 года назад

Security update for grafana

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:1396-1

больше 3 лет назад

Security update for SUSE Manager Client Tools

EPSS: Низкий
suse-cvrf логотип

SUSE-FU-2022:1419-1

больше 3 лет назад

Feature update for grafana

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:2134-1

больше 3 лет назад

Security update for SUSE Manager Client Tools

EPSS: Низкий
redos логотип

ROS-20251016-04

4 дня назад

Множественные уязвимости edk2-tools

CVSS3: 9.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
github логотип
GHSA-5ww6-px42-wc85

SM2 Decryption Buffer Overflow

CVSS3: 9.8
3%
Низкий
больше 3 лет назад
ubuntu логотип
CVE-2021-3711

In order to decrypt SM2 encrypted data an application is expected to call the API function EVP_PKEY_decrypt(). Typically an application will call this function twice. The first time, on entry, the "out" parameter can be NULL and, on exit, the "outlen" parameter is populated with the buffer size required to hold the decrypted plaintext. The application can then allocate a sufficiently sized buffer and call EVP_PKEY_decrypt() again, but this time passing a non-NULL value for the "out" parameter. A bug in the implementation of the SM2 decryption code means that the calculation of the buffer size required to hold the plaintext returned by the first call to EVP_PKEY_decrypt() can be smaller than the actual size required by the second call. This can lead to a buffer overflow when EVP_PKEY_decrypt() is called by the application a second time with a buffer that is too small. A malicious attacker who is able present SM2 content for decryption to an application could cause attacker chosen dat...

CVSS3: 9.8
3%
Низкий
около 4 лет назад
redhat логотип
CVE-2021-3711

In order to decrypt SM2 encrypted data an application is expected to call the API function EVP_PKEY_decrypt(). Typically an application will call this function twice. The first time, on entry, the "out" parameter can be NULL and, on exit, the "outlen" parameter is populated with the buffer size required to hold the decrypted plaintext. The application can then allocate a sufficiently sized buffer and call EVP_PKEY_decrypt() again, but this time passing a non-NULL value for the "out" parameter. A bug in the implementation of the SM2 decryption code means that the calculation of the buffer size required to hold the plaintext returned by the first call to EVP_PKEY_decrypt() can be smaller than the actual size required by the second call. This can lead to a buffer overflow when EVP_PKEY_decrypt() is called by the application a second time with a buffer that is too small. A malicious attacker who is able present SM2 content for decryption to an application could cause attacker chosen dat...

CVSS3: 9.8
3%
Низкий
около 4 лет назад
nvd логотип
CVE-2021-3711

In order to decrypt SM2 encrypted data an application is expected to call the API function EVP_PKEY_decrypt(). Typically an application will call this function twice. The first time, on entry, the "out" parameter can be NULL and, on exit, the "outlen" parameter is populated with the buffer size required to hold the decrypted plaintext. The application can then allocate a sufficiently sized buffer and call EVP_PKEY_decrypt() again, but this time passing a non-NULL value for the "out" parameter. A bug in the implementation of the SM2 decryption code means that the calculation of the buffer size required to hold the plaintext returned by the first call to EVP_PKEY_decrypt() can be smaller than the actual size required by the second call. This can lead to a buffer overflow when EVP_PKEY_decrypt() is called by the application a second time with a buffer that is too small. A malicious attacker who is able present SM2 content for decryption to an application could cause attacker chosen data t

CVSS3: 9.8
3%
Низкий
около 4 лет назад
msrc логотип
CVE-2021-3711

OpenSSL: CVE-2021-3711 SM2 Decryption Buffer Overflow

3%
Низкий
почти 4 года назад
debian логотип
CVE-2021-3711

In order to decrypt SM2 encrypted data an application is expected to c ...

CVSS3: 9.8
3%
Низкий
около 4 лет назад
fstec логотип
BDU:2021-04570

Уязвимость реализации криптографического алгоритма SM2 библиотеки OpenSSL, позволяющая нарушителю выполнить произвольный код

CVSS3: 9.8
3%
Низкий
около 4 лет назад
suse-cvrf логотип
openSUSE-SU-2021:2830-1

Security update for openssl-1_1

около 4 лет назад
suse-cvrf логотип
openSUSE-SU-2021:1188-1

Security update for openssl-1_1

около 4 лет назад
suse-cvrf логотип
SUSE-SU-2021:2833-1

Security update for openssl-1_1

около 4 лет назад
suse-cvrf логотип
SUSE-SU-2021:2830-1

Security update for openssl-1_1

около 4 лет назад
redos логотип
ROS-20240412-06

Множественные уязвимости etcd

CVSS3: 9.8
больше 1 года назад
suse-cvrf логотип
SUSE-SU-2022:4437-1

Security update for SUSE Manager Client Tools

почти 3 года назад
suse-cvrf логотип
SUSE-SU-2022:4428-1

Security update for grafana

почти 3 года назад
suse-cvrf логотип
SUSE-SU-2022:1396-1

Security update for SUSE Manager Client Tools

больше 3 лет назад
suse-cvrf логотип
SUSE-FU-2022:1419-1

Feature update for grafana

больше 3 лет назад
suse-cvrf логотип
SUSE-SU-2022:2134-1

Security update for SUSE Manager Client Tools

больше 3 лет назад
redos логотип
ROS-20251016-04

Множественные уязвимости edk2-tools

CVSS3: 9.8
4 дня назад

Уязвимостей на страницу