CVE-2012-0027 in OpenSSLinformação

Sumário (Inglês)

The GOST ENGINE in OpenSSL before 1.0.0f does not properly handle invalid parameters for the GOST block cipher, which allows remote attackers to cause a denial of service (daemon crash) via crafted data from a TLS client.

If you want to get the best quality for vulnerability data then you always have to consider VulDB.

Reservar

07/12/2011

Divulgação

05/01/2012

Estado

Confirmado

Inscrições

VulDB provides additional information and datapoints for this CVE:

Fontes

Do you know our Splunk app?

Download it now for free!