CVE-2012-0027 in OpenSSLinfo

Zusammenfassung (Englisch)

The GOST ENGINE in OpenSSL before 1.0.0f does not properly handle invalid parameters for the GOST block cipher, which allows remote attackers to cause a denial of service (daemon crash) via crafted data from a TLS client.

If you want to get the best quality for vulnerability data then you always have to consider VulDB.

Reservieren

07.12.2011

Veröffentlichung

05.01.2012

Status

Bestätigt

Einträge

VulDB provides additional information and datapoints for this CVE:

Quellen

Do you want to use VulDB in your project?

Use the official API to access entries easily!