Логотип exploitDog
bind:CVE-2025-69420
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-69420

Количество 26

Количество 26

ubuntu логотип

CVE-2025-69420

около 2 месяцев назад

Issue summary: A type confusion vulnerability exists in the TimeStamp Response verification code where an ASN1_TYPE union member is accessed without first validating the type, causing an invalid or NULL pointer dereference when processing a malformed TimeStamp Response file. Impact summary: An application calling TS_RESP_verify_response() with a malformed TimeStamp Response can be caused to dereference an invalid or NULL pointer when reading, resulting in a Denial of Service. The functions ossl_ess_get_signing_cert() and ossl_ess_get_signing_cert_v2() access the signing cert attribute value without validating its type. When the type is not V_ASN1_SEQUENCE, this results in accessing invalid memory through the ASN1_TYPE union, causing a crash. Exploiting this vulnerability requires an attacker to provide a malformed TimeStamp Response to an application that verifies timestamp responses. The TimeStamp protocol (RFC 3161) is not widely used and the impact of the exploit is just a Denial...

CVSS3: 7.5
EPSS: Низкий
redhat логотип

CVE-2025-69420

около 2 месяцев назад

Issue summary: A type confusion vulnerability exists in the TimeStamp Response verification code where an ASN1_TYPE union member is accessed without first validating the type, causing an invalid or NULL pointer dereference when processing a malformed TimeStamp Response file. Impact summary: An application calling TS_RESP_verify_response() with a malformed TimeStamp Response can be caused to dereference an invalid or NULL pointer when reading, resulting in a Denial of Service. The functions ossl_ess_get_signing_cert() and ossl_ess_get_signing_cert_v2() access the signing cert attribute value without validating its type. When the type is not V_ASN1_SEQUENCE, this results in accessing invalid memory through the ASN1_TYPE union, causing a crash. Exploiting this vulnerability requires an attacker to provide a malformed TimeStamp Response to an application that verifies timestamp responses. The TimeStamp protocol (RFC 3161) is not widely used and the impact of the exploit is just a Denial...

CVSS3: 5.9
EPSS: Низкий
nvd логотип

CVE-2025-69420

около 2 месяцев назад

Issue summary: A type confusion vulnerability exists in the TimeStamp Response verification code where an ASN1_TYPE union member is accessed without first validating the type, causing an invalid or NULL pointer dereference when processing a malformed TimeStamp Response file. Impact summary: An application calling TS_RESP_verify_response() with a malformed TimeStamp Response can be caused to dereference an invalid or NULL pointer when reading, resulting in a Denial of Service. The functions ossl_ess_get_signing_cert() and ossl_ess_get_signing_cert_v2() access the signing cert attribute value without validating its type. When the type is not V_ASN1_SEQUENCE, this results in accessing invalid memory through the ASN1_TYPE union, causing a crash. Exploiting this vulnerability requires an attacker to provide a malformed TimeStamp Response to an application that verifies timestamp responses. The TimeStamp protocol (RFC 3161) is not widely used and the impact of the exploit is just a Denial

CVSS3: 7.5
EPSS: Низкий
debian логотип

CVE-2025-69420

около 2 месяцев назад

Issue summary: A type confusion vulnerability exists in the TimeStamp ...

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-w42r-ph9f-9x66

около 2 месяцев назад

Issue summary: A type confusion vulnerability exists in the TimeStamp Response verification code where an ASN1_TYPE union member is accessed without first validating the type, causing an invalid or NULL pointer dereference when processing a malformed TimeStamp Response file. Impact summary: An application calling TS_RESP_verify_response() with a malformed TimeStamp Response can be caused to dereference an invalid or NULL pointer when reading, resulting in a Denial of Service. The functions ossl_ess_get_signing_cert() and ossl_ess_get_signing_cert_v2() access the signing cert attribute value without validating its type. When the type is not V_ASN1_SEQUENCE, this results in accessing invalid memory through the ASN1_TYPE union, causing a crash. Exploiting this vulnerability requires an attacker to provide a malformed TimeStamp Response to an application that verifies timestamp responses. The TimeStamp protocol (RFC 3161) is not widely used and the impact of the exploit is just a Den...

CVSS3: 7.5
EPSS: Низкий
fstec логотип

BDU:2026-01219

3 месяца назад

Уязвимость функции TS_RESP_verify_response() библиотеки OpenSSL, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0498-1

около 1 месяца назад

Security update for openssl1

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0333-1

около 2 месяцев назад

Security update for openssl-1_0_0

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0332-1

около 2 месяцев назад

Security update for openssl-1_0_0

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0360-1

около 2 месяцев назад

Security update for openssl-1_1

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0359-1

около 2 месяцев назад

Security update for openssl-1_1

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0358-1

около 2 месяцев назад

Security update for openssl-1_1

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0346-1

около 2 месяцев назад

Security update for openssl-1_1

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0331-1

около 2 месяцев назад

Security update for openssl-1_1

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0312-1

около 2 месяцев назад

Security update for openssl-3

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0311-1

около 2 месяцев назад

Security update for openssl-3

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0310-1

около 2 месяцев назад

Security update for openssl-3

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0309-1

около 2 месяцев назад

Security update for openssl-3

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2026:20152-1

около 2 месяцев назад

Security update for openssl-3

EPSS: Низкий
rocky логотип

RLSA-2026:1473

около 2 месяцев назад

Important: openssl security update

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2025-69420

Issue summary: A type confusion vulnerability exists in the TimeStamp Response verification code where an ASN1_TYPE union member is accessed without first validating the type, causing an invalid or NULL pointer dereference when processing a malformed TimeStamp Response file. Impact summary: An application calling TS_RESP_verify_response() with a malformed TimeStamp Response can be caused to dereference an invalid or NULL pointer when reading, resulting in a Denial of Service. The functions ossl_ess_get_signing_cert() and ossl_ess_get_signing_cert_v2() access the signing cert attribute value without validating its type. When the type is not V_ASN1_SEQUENCE, this results in accessing invalid memory through the ASN1_TYPE union, causing a crash. Exploiting this vulnerability requires an attacker to provide a malformed TimeStamp Response to an application that verifies timestamp responses. The TimeStamp protocol (RFC 3161) is not widely used and the impact of the exploit is just a Denial...

CVSS3: 7.5
0%
Низкий
около 2 месяцев назад
redhat логотип
CVE-2025-69420

Issue summary: A type confusion vulnerability exists in the TimeStamp Response verification code where an ASN1_TYPE union member is accessed without first validating the type, causing an invalid or NULL pointer dereference when processing a malformed TimeStamp Response file. Impact summary: An application calling TS_RESP_verify_response() with a malformed TimeStamp Response can be caused to dereference an invalid or NULL pointer when reading, resulting in a Denial of Service. The functions ossl_ess_get_signing_cert() and ossl_ess_get_signing_cert_v2() access the signing cert attribute value without validating its type. When the type is not V_ASN1_SEQUENCE, this results in accessing invalid memory through the ASN1_TYPE union, causing a crash. Exploiting this vulnerability requires an attacker to provide a malformed TimeStamp Response to an application that verifies timestamp responses. The TimeStamp protocol (RFC 3161) is not widely used and the impact of the exploit is just a Denial...

CVSS3: 5.9
0%
Низкий
около 2 месяцев назад
nvd логотип
CVE-2025-69420

Issue summary: A type confusion vulnerability exists in the TimeStamp Response verification code where an ASN1_TYPE union member is accessed without first validating the type, causing an invalid or NULL pointer dereference when processing a malformed TimeStamp Response file. Impact summary: An application calling TS_RESP_verify_response() with a malformed TimeStamp Response can be caused to dereference an invalid or NULL pointer when reading, resulting in a Denial of Service. The functions ossl_ess_get_signing_cert() and ossl_ess_get_signing_cert_v2() access the signing cert attribute value without validating its type. When the type is not V_ASN1_SEQUENCE, this results in accessing invalid memory through the ASN1_TYPE union, causing a crash. Exploiting this vulnerability requires an attacker to provide a malformed TimeStamp Response to an application that verifies timestamp responses. The TimeStamp protocol (RFC 3161) is not widely used and the impact of the exploit is just a Denial

CVSS3: 7.5
0%
Низкий
около 2 месяцев назад
debian логотип
CVE-2025-69420

Issue summary: A type confusion vulnerability exists in the TimeStamp ...

CVSS3: 7.5
0%
Низкий
около 2 месяцев назад
github логотип
GHSA-w42r-ph9f-9x66

Issue summary: A type confusion vulnerability exists in the TimeStamp Response verification code where an ASN1_TYPE union member is accessed without first validating the type, causing an invalid or NULL pointer dereference when processing a malformed TimeStamp Response file. Impact summary: An application calling TS_RESP_verify_response() with a malformed TimeStamp Response can be caused to dereference an invalid or NULL pointer when reading, resulting in a Denial of Service. The functions ossl_ess_get_signing_cert() and ossl_ess_get_signing_cert_v2() access the signing cert attribute value without validating its type. When the type is not V_ASN1_SEQUENCE, this results in accessing invalid memory through the ASN1_TYPE union, causing a crash. Exploiting this vulnerability requires an attacker to provide a malformed TimeStamp Response to an application that verifies timestamp responses. The TimeStamp protocol (RFC 3161) is not widely used and the impact of the exploit is just a Den...

CVSS3: 7.5
0%
Низкий
около 2 месяцев назад
fstec логотип
BDU:2026-01219

Уязвимость функции TS_RESP_verify_response() библиотеки OpenSSL, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
0%
Низкий
3 месяца назад
suse-cvrf логотип
SUSE-SU-2026:0498-1

Security update for openssl1

около 1 месяца назад
suse-cvrf логотип
SUSE-SU-2026:0333-1

Security update for openssl-1_0_0

около 2 месяцев назад
suse-cvrf логотип
SUSE-SU-2026:0332-1

Security update for openssl-1_0_0

около 2 месяцев назад
suse-cvrf логотип
SUSE-SU-2026:0360-1

Security update for openssl-1_1

около 2 месяцев назад
suse-cvrf логотип
SUSE-SU-2026:0359-1

Security update for openssl-1_1

около 2 месяцев назад
suse-cvrf логотип
SUSE-SU-2026:0358-1

Security update for openssl-1_1

около 2 месяцев назад
suse-cvrf логотип
SUSE-SU-2026:0346-1

Security update for openssl-1_1

около 2 месяцев назад
suse-cvrf логотип
SUSE-SU-2026:0331-1

Security update for openssl-1_1

около 2 месяцев назад
suse-cvrf логотип
SUSE-SU-2026:0312-1

Security update for openssl-3

около 2 месяцев назад
suse-cvrf логотип
SUSE-SU-2026:0311-1

Security update for openssl-3

около 2 месяцев назад
suse-cvrf логотип
SUSE-SU-2026:0310-1

Security update for openssl-3

около 2 месяцев назад
suse-cvrf логотип
SUSE-SU-2026:0309-1

Security update for openssl-3

около 2 месяцев назад
suse-cvrf логотип
openSUSE-SU-2026:20152-1

Security update for openssl-3

около 2 месяцев назад
rocky логотип
RLSA-2026:1473

Important: openssl security update

около 2 месяцев назад

Уязвимостей на страницу