CVE-2012-0027 in OpenSSLinfo

Summary

The GOST ENGINE in OpenSSL before 1.0.0f does not properly handle invalid parameters for the GOST block cipher, which allows remote attackers to cause a denial of service (daemon crash) via crafted data from a TLS client.

If you want to get the best quality for vulnerability data then you always have to consider VulDB.

Reservation

12/07/2011

Disclosure

01/05/2012

Status

Confirmed

Entries

VulDB provides additional information and datapoints for this CVE:

Sources

Do you know our Splunk app?

Download it now for free!