Vulnerability & Exploit Database

Back to search

OpenSSL Invalid GOST parameters DoS Attack (CVE-2012-0027)

Severity CVSS Published Added Modified
5 (AV:N/AC:L/Au:N/C:N/I:N/A:P) January 05, 2012 January 26, 2012 May 27, 2016

Description

The GOST ENGINE in OpenSSL before 1.0.0f does not properly handle invalid parameters for the GOST block cipher, which allows remote attackers to cause a denial of service (daemon crash) via crafted data from a TLS client.

Free Nexpose Download

Discover, prioritize, and remediate security risks today!

 Download now

References

Solution

http-openssl-1_0_0-upgrade-1_0_0_f

Related Vulnerabilities