CVE-2012-2110
Publication date 19 April 2012
Last updated 24 July 2024
Ubuntu priority
The asn1_d2i_read_bio function in crypto/asn1/a_d2i_fp.c in OpenSSL before 0.9.8v, 1.0.0 before 1.0.0i, and 1.0.1 before 1.0.1a does not properly interpret integer data, which allows remote attackers to conduct buffer overflow attacks, and cause a denial of service (memory corruption) or possibly have unspecified other impact, via crafted DER data, as demonstrated by an X.509 certificate or an RSA public key.
Status
Package | Ubuntu Release | Status |
---|---|---|
openssl | 11.10 oneiric |
Fixed 1.0.0e-2ubuntu4.4
|
11.04 natty |
Fixed 0.9.8o-5ubuntu1.4
|
|
10.04 LTS lucid |
Fixed 0.9.8k-7ubuntu8.10
|
|
8.04 LTS hardy |
Fixed 0.9.8g-4ubuntu3.17
|
|
openssl098 | 11.10 oneiric |
Fixed 0.9.8o-7ubuntu1.2
|
11.04 natty | Not in release | |
10.04 LTS lucid | Not in release | |
8.04 LTS hardy | Not in release |
References
Related Ubuntu Security Notices (USN)
- USN-1424-1
- OpenSSL vulnerabilities
- 19 April 2012