CVE-2012-2131
Published: 24 April 2012
Multiple integer signedness errors in crypto/buffer/buffer.c in OpenSSL 0.9.8v allow remote attackers to conduct buffer overflow attacks, and cause a denial of service (memory corruption) or possibly have unspecified other impact, via crafted DER data, as demonstrated by an X.509 certificate or an RSA public key. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-2110.
Notes
Author | Note |
---|---|
mdeslaur | 1.0.x not affected by CVE-2012-2131 all releases also have second patch to fix incorrect error code introduced in the fix for CVE-2012-2110 |
Priority
Status
Package | Release | Status |
---|---|---|
openssl Launchpad, Ubuntu, Debian |
upstream |
Released
(0.9.8w)
|
hardy |
Released
(0.9.8g-4ubuntu3.18)
|
|
lucid |
Released
(0.9.8k-7ubuntu8.11)
|
|
natty |
Released
(0.9.8o-5ubuntu1.5)
|
|
oneiric |
Not vulnerable
(1.0.0e-2ubuntu4.4)
|
|
Patches: upstream: http://cvs.openssl.org/chngview?cn=22479 upstream: http://cvs.openssl.org/chngview?cn=22476 (0.9.8-error code) upstream: http://cvs.openssl.org/chngview?cn=22475 (1.0-error code) upstream: http://cvs.openssl.org/chngview?cn=22474 (1.0.1-error code) |
||
openssl098 Launchpad, Ubuntu, Debian |
upstream |
Released
(0.9.8w)
|
hardy |
Does not exist
|
|
lucid |
Does not exist
|
|
natty |
Does not exist
|
|
oneiric |
Released
(0.9.8o-7ubuntu1.2)
|