Revision Date: | 2014-08-04 | Version: | 44 |
Title: | OpenSSL vulnerability in before 0.9.8v allow remote attackers to conduct buffer overflow attacks, and cause a denial of service (memory corruption) or possibly have unspecified other impact |
Description: | Multiple integer signedness errors in crypto/buffer/buffer.c in OpenSSL 0.9.8v allow remote attackers to conduct buffer overflow attacks, and cause a denial of service (memory corruption) or possibly have unspecified other impact, via crafted DER data, as demonstrated by an X.509 certificate or an RSA public key. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-2110. |
Family: | windows | Class: | vulnerability |
Status: | ACCEPTED | Reference(s): | CVE-2012-2131
|
Platform(s): | Microsoft Windows 7 Microsoft Windows 8 Microsoft Windows 8.1 Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows Server 2012 Microsoft Windows Server 2012 R2 Microsoft Windows Vista Microsoft Windows XP
| Product(s): | OpenSSL
|
Definition Synopsis |
Check vulnerable OpenSSL Check if the version of OpenSSL 0.9.8v
AND OpenSSL is installed
OR Check vulnerable OpenSSL (32_bit)
Check if the version of OpenSSL 0.9.8v (32_bit)
AND OpenSSL (32_bit) is installed
OR Check if the version of ssleay32.dll 0.9.8v
OR Check if the version of ssleay32.dll 0.9.8v (32_bit)
OR Check if the version of ssleay32.dll 0.9.8v under System Root
|