CVE-2012-2333
14.05.2012, 22:55
Integer underflow in OpenSSL before 0.9.8x, 1.0.0 before 1.0.0j, and 1.0.1 before 1.0.1c, when TLS 1.1, TLS 1.2, or DTLS is used with CBC encryption, allows remote attackers to cause a denial of service (buffer over-read) or possibly have unspecified other impact via a crafted TLS packet that is not properly handled during a certain explicit IV calculation.Enginsight
Vendor | Product | Version |
---|---|---|
openssl | openssl | 𝑥 ≤ 0.9.8w |
openssl | openssl | 0.9.1c:c |
openssl | openssl | 0.9.2b:b |
openssl | openssl | 0.9.3 |
openssl | openssl | 0.9.3a:a |
openssl | openssl | 0.9.4 |
openssl | openssl | 0.9.5 |
openssl | openssl | 0.9.5:beta1 |
openssl | openssl | 0.9.5:beta2 |
openssl | openssl | 0.9.5a:a |
openssl | openssl | 0.9.5a:a |
openssl | openssl | 0.9.5a:a |
openssl | openssl | 0.9.6 |
openssl | openssl | 0.9.6:beta1 |
openssl | openssl | 0.9.6:beta2 |
openssl | openssl | 0.9.6:beta3 |
openssl | openssl | 0.9.6a:a |
openssl | openssl | 0.9.6a:a |
openssl | openssl | 0.9.6a:a |
openssl | openssl | 0.9.6a:a |
openssl | openssl | 0.9.6b:b |
openssl | openssl | 0.9.6c:c |
openssl | openssl | 0.9.6d:d |
openssl | openssl | 0.9.6e:e |
openssl | openssl | 0.9.6f:f |
openssl | openssl | 0.9.6g:g |
openssl | openssl | 0.9.6h:h |
openssl | openssl | 0.9.6i:i |
openssl | openssl | 0.9.6j:j |
openssl | openssl | 0.9.6k:k |
openssl | openssl | 0.9.6l:l |
openssl | openssl | 0.9.6m:m |
openssl | openssl | 0.9.7 |
openssl | openssl | 0.9.7:beta1 |
openssl | openssl | 0.9.7:beta2 |
openssl | openssl | 0.9.7:beta3 |
openssl | openssl | 0.9.7:beta4 |
openssl | openssl | 0.9.7:beta5 |
openssl | openssl | 0.9.7:beta6 |
openssl | openssl | 0.9.7a:a |
openssl | openssl | 0.9.7b:b |
openssl | openssl | 0.9.7c:c |
openssl | openssl | 0.9.7d:d |
openssl | openssl | 0.9.7e:e |
openssl | openssl | 0.9.7f:f |
openssl | openssl | 0.9.7g:g |
openssl | openssl | 0.9.7h:h |
openssl | openssl | 0.9.7i:i |
openssl | openssl | 0.9.7j:j |
openssl | openssl | 0.9.7k:k |
openssl | openssl | 0.9.7l:l |
openssl | openssl | 0.9.7m:m |
openssl | openssl | 0.9.8 |
openssl | openssl | 0.9.8a:a |
openssl | openssl | 0.9.8b:b |
openssl | openssl | 0.9.8c:c |
openssl | openssl | 0.9.8d:d |
openssl | openssl | 0.9.8e:e |
openssl | openssl | 0.9.8f:f |
openssl | openssl | 0.9.8g:g |
openssl | openssl | 0.9.8h:h |
openssl | openssl | 0.9.8i:i |
openssl | openssl | 0.9.8j:j |
openssl | openssl | 0.9.8k:k |
openssl | openssl | 0.9.8l:l |
openssl | openssl | 0.9.8m:m |
openssl | openssl | 0.9.8m:m |
openssl | openssl | 0.9.8n:n |
openssl | openssl | 0.9.8o:o |
openssl | openssl | 0.9.8p:p |
openssl | openssl | 0.9.8q:q |
openssl | openssl | 0.9.8r:r |
openssl | openssl | 0.9.8s:s |
openssl | openssl | 0.9.8t:t |
openssl | openssl | 0.9.8u:u |
openssl | openssl | 0.9.8v:v |
redhat | openssl | 0.9.6-15 |
redhat | openssl | 0.9.6b-3:b |
redhat | openssl | 0.9.7a-2:a |
openssl | openssl | 1.0.0 |
openssl | openssl | 1.0.0:beta1 |
openssl | openssl | 1.0.0:beta2 |
openssl | openssl | 1.0.0:beta3 |
openssl | openssl | 1.0.0:beta4 |
openssl | openssl | 1.0.0:beta5 |
openssl | openssl | 1.0.0a:a |
openssl | openssl | 1.0.0b:b |
openssl | openssl | 1.0.0c:c |
openssl | openssl | 1.0.0d:d |
openssl | openssl | 1.0.0e:e |
openssl | openssl | 1.0.0f:f |
openssl | openssl | 1.0.0g:g |
openssl | openssl | 1.0.0h:h |
openssl | openssl | 1.0.1 |
openssl | openssl | 1.0.1:beta1 |
openssl | openssl | 1.0.1:beta2 |
openssl | openssl | 1.0.1:beta3 |
openssl | openssl | 1.0.1a:a |
openssl | openssl | 1.0.1b:b |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Ubuntu Product | |||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
openssl |
| ||||||||||||||||||
openssl098 |
|
Common Weakness Enumeration
References