Количество 42
Количество 42
GHSA-x4qr-2fvf-3mr5
Vulnerable OpenSSL included in cryptography wheels

CVE-2023-0286
There is a type confusion vulnerability relating to X.400 address processing inside an X.509 GeneralName. X.400 addresses were parsed as an ASN1_STRING but the public structure definition for GENERAL_NAME incorrectly specified the type of the x400Address field as ASN1_TYPE. This field is subsequently interpreted by the OpenSSL function GENERAL_NAME_cmp as an ASN1_TYPE rather than an ASN1_STRING. When CRL checking is enabled (i.e. the application sets the X509_V_FLAG_CRL_CHECK flag), this vulnerability may allow an attacker to pass arbitrary pointers to a memcmp call, enabling them to read memory contents or enact a denial of service. In most cases, the attack requires the attacker to provide both the certificate chain and CRL, neither of which need to have a valid signature. If the attacker only controls one of these inputs, the other input must already contain an X.400 address as a CRL distribution point, which is uncommon. As such, this vulnerability is most likely to only affect ...

CVE-2023-0286
There is a type confusion vulnerability relating to X.400 address processing inside an X.509 GeneralName. X.400 addresses were parsed as an ASN1_STRING but the public structure definition for GENERAL_NAME incorrectly specified the type of the x400Address field as ASN1_TYPE. This field is subsequently interpreted by the OpenSSL function GENERAL_NAME_cmp as an ASN1_TYPE rather than an ASN1_STRING. When CRL checking is enabled (i.e. the application sets the X509_V_FLAG_CRL_CHECK flag), this vulnerability may allow an attacker to pass arbitrary pointers to a memcmp call, enabling them to read memory contents or enact a denial of service. In most cases, the attack requires the attacker to provide both the certificate chain and CRL, neither of which need to have a valid signature. If the attacker only controls one of these inputs, the other input must already contain an X.400 address as a CRL distribution point, which is uncommon. As such, this vulnerability is most likely to only affect ...

CVE-2023-0286
There is a type confusion vulnerability relating to X.400 address processing inside an X.509 GeneralName. X.400 addresses were parsed as an ASN1_STRING but the public structure definition for GENERAL_NAME incorrectly specified the type of the x400Address field as ASN1_TYPE. This field is subsequently interpreted by the OpenSSL function GENERAL_NAME_cmp as an ASN1_TYPE rather than an ASN1_STRING. When CRL checking is enabled (i.e. the application sets the X509_V_FLAG_CRL_CHECK flag), this vulnerability may allow an attacker to pass arbitrary pointers to a memcmp call, enabling them to read memory contents or enact a denial of service. In most cases, the attack requires the attacker to provide both the certificate chain and CRL, neither of which need to have a valid signature. If the attacker only controls one of these inputs, the other input must already contain an X.400 address as a CRL distribution point, which is uncommon. As such, this vulnerability is most likely to only affect ap

CVE-2023-0286
CVE-2023-0286
There is a type confusion vulnerability relating to X.400 address proc ...

SUSE-SU-2023:0482-1
Security update for openssl-1_1-livepatches
ELSA-2025-7937
ELSA-2025-7937: compat-openssl11 security update (IMPORTANT)
ELSA-2025-7895
ELSA-2025-7895: compat-openssl10 security update (IMPORTANT)
ELSA-2023-1335
ELSA-2023-1335: openssl security update (IMPORTANT)
ELSA-2023-12326
ELSA-2023-12326: openssl security update (IMPORTANT)
ELSA-2023-12297
ELSA-2023-12297: openssl security update (IMPORTANT)
ELSA-2023-12210
ELSA-2023-12210: openssl security update (IMPORTANT)
ELSA-2023-12205
ELSA-2023-12205: openssl security update (IMPORTANT)

BDU:2023-00665
Уязвимость функции GENERAL_NAME_cmp библиотеки OpenSSL, позволяющая нарушителю вызвать отказ в обслуживании

BDU:2023-00675
Уязвимость функции BIO_new_NDEF() библиотеки OpenSSL, позволяющая нарушителю вызвать отказ в обслуживании

SUSE-SU-2023:0684-1
Security update for openssl

SUSE-SU-2023:0308-1
Security update for openssl-1_1

SUSE-SU-2023:0307-1
Security update for openssl1

SUSE-SU-2023:0306-1
Security update for openssl-1_0_0
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
GHSA-x4qr-2fvf-3mr5 Vulnerable OpenSSL included in cryptography wheels | CVSS3: 7.4 | 89% Высокий | больше 2 лет назад | |
![]() | CVE-2023-0286 There is a type confusion vulnerability relating to X.400 address processing inside an X.509 GeneralName. X.400 addresses were parsed as an ASN1_STRING but the public structure definition for GENERAL_NAME incorrectly specified the type of the x400Address field as ASN1_TYPE. This field is subsequently interpreted by the OpenSSL function GENERAL_NAME_cmp as an ASN1_TYPE rather than an ASN1_STRING. When CRL checking is enabled (i.e. the application sets the X509_V_FLAG_CRL_CHECK flag), this vulnerability may allow an attacker to pass arbitrary pointers to a memcmp call, enabling them to read memory contents or enact a denial of service. In most cases, the attack requires the attacker to provide both the certificate chain and CRL, neither of which need to have a valid signature. If the attacker only controls one of these inputs, the other input must already contain an X.400 address as a CRL distribution point, which is uncommon. As such, this vulnerability is most likely to only affect ... | CVSS3: 7.4 | 89% Высокий | больше 2 лет назад |
![]() | CVE-2023-0286 There is a type confusion vulnerability relating to X.400 address processing inside an X.509 GeneralName. X.400 addresses were parsed as an ASN1_STRING but the public structure definition for GENERAL_NAME incorrectly specified the type of the x400Address field as ASN1_TYPE. This field is subsequently interpreted by the OpenSSL function GENERAL_NAME_cmp as an ASN1_TYPE rather than an ASN1_STRING. When CRL checking is enabled (i.e. the application sets the X509_V_FLAG_CRL_CHECK flag), this vulnerability may allow an attacker to pass arbitrary pointers to a memcmp call, enabling them to read memory contents or enact a denial of service. In most cases, the attack requires the attacker to provide both the certificate chain and CRL, neither of which need to have a valid signature. If the attacker only controls one of these inputs, the other input must already contain an X.400 address as a CRL distribution point, which is uncommon. As such, this vulnerability is most likely to only affect ... | CVSS3: 7.4 | 89% Высокий | больше 2 лет назад |
![]() | CVE-2023-0286 There is a type confusion vulnerability relating to X.400 address processing inside an X.509 GeneralName. X.400 addresses were parsed as an ASN1_STRING but the public structure definition for GENERAL_NAME incorrectly specified the type of the x400Address field as ASN1_TYPE. This field is subsequently interpreted by the OpenSSL function GENERAL_NAME_cmp as an ASN1_TYPE rather than an ASN1_STRING. When CRL checking is enabled (i.e. the application sets the X509_V_FLAG_CRL_CHECK flag), this vulnerability may allow an attacker to pass arbitrary pointers to a memcmp call, enabling them to read memory contents or enact a denial of service. In most cases, the attack requires the attacker to provide both the certificate chain and CRL, neither of which need to have a valid signature. If the attacker only controls one of these inputs, the other input must already contain an X.400 address as a CRL distribution point, which is uncommon. As such, this vulnerability is most likely to only affect ap | CVSS3: 7.4 | 89% Высокий | больше 2 лет назад |
![]() | CVSS3: 7.4 | 89% Высокий | больше 2 лет назад | |
CVE-2023-0286 There is a type confusion vulnerability relating to X.400 address proc ... | CVSS3: 7.4 | 89% Высокий | больше 2 лет назад | |
![]() | SUSE-SU-2023:0482-1 Security update for openssl-1_1-livepatches | 89% Высокий | больше 2 лет назад | |
ELSA-2025-7937 ELSA-2025-7937: compat-openssl11 security update (IMPORTANT) | 29 дней назад | |||
ELSA-2025-7895 ELSA-2025-7895: compat-openssl10 security update (IMPORTANT) | около 1 месяца назад | |||
ELSA-2023-1335 ELSA-2023-1335: openssl security update (IMPORTANT) | около 2 лет назад | |||
ELSA-2023-12326 ELSA-2023-12326: openssl security update (IMPORTANT) | около 2 лет назад | |||
ELSA-2023-12297 ELSA-2023-12297: openssl security update (IMPORTANT) | около 2 лет назад | |||
ELSA-2023-12210 ELSA-2023-12210: openssl security update (IMPORTANT) | около 2 лет назад | |||
ELSA-2023-12205 ELSA-2023-12205: openssl security update (IMPORTANT) | около 2 лет назад | |||
![]() | BDU:2023-00665 Уязвимость функции GENERAL_NAME_cmp библиотеки OpenSSL, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 7.4 | 89% Высокий | больше 2 лет назад |
![]() | BDU:2023-00675 Уязвимость функции BIO_new_NDEF() библиотеки OpenSSL, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 6.3 | 0% Низкий | больше 2 лет назад |
![]() | SUSE-SU-2023:0684-1 Security update for openssl | больше 2 лет назад | ||
![]() | SUSE-SU-2023:0308-1 Security update for openssl-1_1 | больше 2 лет назад | ||
![]() | SUSE-SU-2023:0307-1 Security update for openssl1 | больше 2 лет назад | ||
![]() | SUSE-SU-2023:0306-1 Security update for openssl-1_0_0 | больше 2 лет назад |
Уязвимостей на страницу