Vulnerability & Exploit Database

Back to search

OpenSSL Invalid GOST parameters DoS Attack (CVE-2012-0027)

Severity CVSS Published Added Modified
5 (AV:N/AC:L/Au:N/C:N/I:N/A:P) January 05, 2012 January 26, 2012 May 27, 2016

Description

The GOST ENGINE in OpenSSL before 1.0.0f does not properly handle invalid parameters for the GOST block cipher, which allows remote attackers to cause a denial of service (daemon crash) via crafted data from a TLS client.

Scan For This Vulnerability

Use our top-rated tool to discover, prioritize, and remediate your vulnerabilities

 Free InsightVM Trial

References

Solution

http-openssl-1_0_0-upgrade-1_0_0_f

Related Vulnerabilities