Startseite ▼ Bookkeeping
Online ▼ Sicherheits
Überprüfungs ▼
Verwaltetes
DNS ▼
Info
Bestellen/Erneuern
FAQ
AUP
Dynamic DNS Clients
Domaine konfigurieren Dyanmic DNS Update Password Netzwerk
Überwachung ▼
Enterprise
Erweiterte
Standard
Gratis Test
FAQ
Preis/Funktionszusammenfassung
Bestellen
Beispiele
Konfigurieren/Status Alarm Profile | |||
Test Kennung: | 1.3.6.1.4.1.25623.1.0.100668 |
Kategorie: | Denial of Service |
Titel: | OpenSSL Cryptographic Message Syntax Memory Corruption Vulnerability |
Zusammenfassung: | OpenSSL is prone to a remote memory-corruption vulnerability. |
Beschreibung: | Summary: OpenSSL is prone to a remote memory-corruption vulnerability. Vulnerability Insight: An attacker can exploit this issue by supplying specially crafted structures to a vulnerable application that uses the affected library. Vulnerability Impact: Successfully exploiting this issue can allow the attacker to execute arbitrary code. Failed exploit attempts will result in a denial-of-service condition. Affected Software/OS: Versions of OpenSSL 0.9.8.h through 0.9.8n and OpenSSL 1.0.x prior to 1.0.0a are affected. Note that Cryptographic Message Syntax (CMS) functionality is only enabled by default in OpenSSL versions 1.0.x. Solution: Updates are available. Please see the references for more information. CVSS Score: 7.5 CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P |
Querverweis: |
BugTraq ID: 40502 Common Vulnerability Exposure (CVE) ID: CVE-2010-0742 http://www.securityfocus.com/bid/40502 HPdes Security Advisory: HPSBUX02610 http://marc.info/?l=bugtraq&m=129138643405740&w=2 HPdes Security Advisory: SSRT100341 https://lists.balabit.com/pipermail/syslog-ng-announce/2011-January/000101.html https://lists.balabit.com/pipermail/syslog-ng-announce/2011-January/000102.html https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12395 http://secunia.com/advisories/40000 http://secunia.com/advisories/40024 http://secunia.com/advisories/42457 http://secunia.com/advisories/42724 http://secunia.com/advisories/42733 http://secunia.com/advisories/57353 http://www.vupen.com/english/advisories/2010/1313 http://www.vupen.com/english/advisories/2010/3105 |
Copyright | Copyright (C) 2010 Greenbone Networks GmbH |
Dies ist nur einer von 99761 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus. Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten. |