Количество 40
Количество 40
GHSA-x3mh-jvjw-3xwx
openssl-src's infinite loop in `BN_mod_sqrt()` reachable when parsing certificates

CVE-2022-0778
The BN_mod_sqrt() function, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli. Internally this function is used when parsing certificates that contain elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded in compressed form. It is possible to trigger the infinite loop by crafting a certificate that has invalid explicit curve parameters. Since certificate parsing happens prior to verification of the certificate signature, any process that parses an externally supplied certificate may thus be subject to a denial of service attack. The infinite loop can also be reached when parsing crafted private keys as they can contain explicit elliptic curve parameters. Thus vulnerable situations include: - TLS clients consuming server certificates - TLS servers consuming client certificates - Hosting providers taking certificates or private keys from customers - Certificate authorities...

CVE-2022-0778
The BN_mod_sqrt() function, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli. Internally this function is used when parsing certificates that contain elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded in compressed form. It is possible to trigger the infinite loop by crafting a certificate that has invalid explicit curve parameters. Since certificate parsing happens prior to verification of the certificate signature, any process that parses an externally supplied certificate may thus be subject to a denial of service attack. The infinite loop can also be reached when parsing crafted private keys as they can contain explicit elliptic curve parameters. Thus vulnerable situations include: - TLS clients consuming server certificates - TLS servers consuming client certificates - Hosting providers taking certificates or private keys from customers - Certificate authorities...

CVE-2022-0778
The BN_mod_sqrt() function, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli. Internally this function is used when parsing certificates that contain elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded in compressed form. It is possible to trigger the infinite loop by crafting a certificate that has invalid explicit curve parameters. Since certificate parsing happens prior to verification of the certificate signature, any process that parses an externally supplied certificate may thus be subject to a denial of service attack. The infinite loop can also be reached when parsing crafted private keys as they can contain explicit elliptic curve parameters. Thus vulnerable situations include: - TLS clients consuming server certificates - TLS servers consuming client certificates - Hosting providers taking certificates or private keys from customers - Certificate authorities pa

CVE-2022-0778
CVE-2022-0778
The BN_mod_sqrt() function, which computes a modular square root, cont ...

openSUSE-SU-2022:0856-1
Security update for openssl-1_0_0

SUSE-SU-2022:14916-1
Security update for openssl1

SUSE-SU-2022:14915-1
Security update for openssl

SUSE-SU-2022:0935-1
Security update for nodejs12

SUSE-SU-2022:0860-1
Security update for openssl-1_1

SUSE-SU-2022:0859-1
Security update for compat-openssl098

SUSE-SU-2022:0857-1
Security update for openssl-1_0_0

SUSE-SU-2022:0856-1
Security update for openssl-1_0_0

SUSE-SU-2022:0854-1
Security update for openssl

SUSE-SU-2022:0853-1
Security update for openssl-1_1

SUSE-SU-2022:0851-1
Security update for openssl-1_1

SUSE-RU-2022:0861-1
Security update for openssl-1_1

RLSA-2022:5326
Low: compat-openssl10 security update

RLSA-2022:4899
Important: compat-openssl11 security and bug fix update
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
GHSA-x3mh-jvjw-3xwx openssl-src's infinite loop in `BN_mod_sqrt()` reachable when parsing certificates | CVSS3: 7.5 | 6% Низкий | больше 3 лет назад | |
![]() | CVE-2022-0778 The BN_mod_sqrt() function, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli. Internally this function is used when parsing certificates that contain elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded in compressed form. It is possible to trigger the infinite loop by crafting a certificate that has invalid explicit curve parameters. Since certificate parsing happens prior to verification of the certificate signature, any process that parses an externally supplied certificate may thus be subject to a denial of service attack. The infinite loop can also be reached when parsing crafted private keys as they can contain explicit elliptic curve parameters. Thus vulnerable situations include: - TLS clients consuming server certificates - TLS servers consuming client certificates - Hosting providers taking certificates or private keys from customers - Certificate authorities... | CVSS3: 7.5 | 6% Низкий | больше 3 лет назад |
![]() | CVE-2022-0778 The BN_mod_sqrt() function, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli. Internally this function is used when parsing certificates that contain elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded in compressed form. It is possible to trigger the infinite loop by crafting a certificate that has invalid explicit curve parameters. Since certificate parsing happens prior to verification of the certificate signature, any process that parses an externally supplied certificate may thus be subject to a denial of service attack. The infinite loop can also be reached when parsing crafted private keys as they can contain explicit elliptic curve parameters. Thus vulnerable situations include: - TLS clients consuming server certificates - TLS servers consuming client certificates - Hosting providers taking certificates or private keys from customers - Certificate authorities... | CVSS3: 7.5 | 6% Низкий | больше 3 лет назад |
![]() | CVE-2022-0778 The BN_mod_sqrt() function, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli. Internally this function is used when parsing certificates that contain elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded in compressed form. It is possible to trigger the infinite loop by crafting a certificate that has invalid explicit curve parameters. Since certificate parsing happens prior to verification of the certificate signature, any process that parses an externally supplied certificate may thus be subject to a denial of service attack. The infinite loop can also be reached when parsing crafted private keys as they can contain explicit elliptic curve parameters. Thus vulnerable situations include: - TLS clients consuming server certificates - TLS servers consuming client certificates - Hosting providers taking certificates or private keys from customers - Certificate authorities pa | CVSS3: 7.5 | 6% Низкий | больше 3 лет назад |
![]() | CVSS3: 7.5 | 6% Низкий | около 3 лет назад | |
CVE-2022-0778 The BN_mod_sqrt() function, which computes a modular square root, cont ... | CVSS3: 7.5 | 6% Низкий | больше 3 лет назад | |
![]() | openSUSE-SU-2022:0856-1 Security update for openssl-1_0_0 | 6% Низкий | больше 3 лет назад | |
![]() | SUSE-SU-2022:14916-1 Security update for openssl1 | 6% Низкий | больше 3 лет назад | |
![]() | SUSE-SU-2022:14915-1 Security update for openssl | 6% Низкий | больше 3 лет назад | |
![]() | SUSE-SU-2022:0935-1 Security update for nodejs12 | 6% Низкий | около 3 лет назад | |
![]() | SUSE-SU-2022:0860-1 Security update for openssl-1_1 | 6% Низкий | больше 3 лет назад | |
![]() | SUSE-SU-2022:0859-1 Security update for compat-openssl098 | 6% Низкий | больше 3 лет назад | |
![]() | SUSE-SU-2022:0857-1 Security update for openssl-1_0_0 | 6% Низкий | больше 3 лет назад | |
![]() | SUSE-SU-2022:0856-1 Security update for openssl-1_0_0 | 6% Низкий | больше 3 лет назад | |
![]() | SUSE-SU-2022:0854-1 Security update for openssl | 6% Низкий | больше 3 лет назад | |
![]() | SUSE-SU-2022:0853-1 Security update for openssl-1_1 | 6% Низкий | больше 3 лет назад | |
![]() | SUSE-SU-2022:0851-1 Security update for openssl-1_1 | 6% Низкий | больше 3 лет назад | |
![]() | SUSE-RU-2022:0861-1 Security update for openssl-1_1 | 6% Низкий | больше 3 лет назад | |
![]() | RLSA-2022:5326 Low: compat-openssl10 security update | 6% Низкий | почти 3 года назад | |
![]() | RLSA-2022:4899 Important: compat-openssl11 security and bug fix update | 6% Низкий | около 3 лет назад |
Уязвимостей на страницу