Anfälligkeitssuche        Suche in 219043 CVE Beschreibungen
und 99761 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.810543
Kategorie:Denial of Service
Titel:OpenSSL Montgomery Multiplication Denial of Service Vulnerability (Windows)
Zusammenfassung:OpenSSL is prone to a Denial of Service (DoS) vulnerability.
Beschreibung:Summary:
OpenSSL is prone to a Denial of Service (DoS) vulnerability.

Vulnerability Insight:
The flaw is due to a carry propagating
bug in the Broadwell-specific Montgomery multiplication procedure that
handles input lengths divisible by, but longer than 256 bits.

Vulnerability Impact:
Successful exploitation will allow a remote
attacker to cause transient authentication, key negotiation failures or
reproducible erroneous outcome of public-key operations with specially
crafted input and also denial of service condition.

Affected Software/OS:
OpenSSL 1.1.0 before 1.1.0c and
1.0.2 before 1.0.2k.

Solution:
Upgrade to OpenSSL version 1.1.0c or
1.0.2k or later.

CVSS Score:
2.6

CVSS Vector:
AV:N/AC:H/Au:N/C:N/I:N/A:P

Querverweis: BugTraq ID: 94242
Common Vulnerability Exposure (CVE) ID: CVE-2016-7055
http://www.securityfocus.com/bid/94242
FreeBSD Security Advisory: FreeBSD-SA-17:02
https://security.FreeBSD.org/advisories/FreeBSD-SA-17:02.openssl.asc
https://security.gentoo.org/glsa/201702-07
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
RedHat Security Advisories: RHSA-2018:2185
https://access.redhat.com/errata/RHSA-2018:2185
RedHat Security Advisories: RHSA-2018:2186
https://access.redhat.com/errata/RHSA-2018:2186
RedHat Security Advisories: RHSA-2018:2187
https://access.redhat.com/errata/RHSA-2018:2187
http://www.securitytracker.com/id/1037261
CopyrightCopyright (C) 2017 Greenbone Networks GmbH

Dies ist nur einer von 99761 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2024 E-Soft Inc. Alle Rechte vorbehalten.