Filtered by vendor Yassl
Subscribe
Total
8 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2008-0226 | 6 Apple, Canonical, Debian and 3 more | 6 Mac Os X, Ubuntu Linux, Debian Linux and 3 more | 2019-12-17 | 7.5 HIGH | N/A |
Multiple buffer overflows in yaSSL 1.7.5 and earlier, as used in MySQL and possibly other products, allow remote attackers to execute arbitrary code via (1) the ProcessOldClientHello function in handshake.cpp or (2) "input_buffer& operator>>" in yassl_imp.cpp. | |||||
CVE-2008-0227 | 1 Yassl | 1 Yassl | 2018-10-15 | 7.5 HIGH | N/A |
yaSSL 1.7.5 and earlier, as used in MySQL and possibly other products, allows remote attackers to cause a denial of service (crash) via a Hello packet containing a large size value, which triggers a buffer over-read in the HASHwithTransform::Update function in hash.cpp. | |||||
CVE-2012-1558 | 1 Yassl | 1 Cyassl | 2018-01-05 | 5.0 MEDIUM | N/A |
yaSSL CyaSSL before 2.0.8 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted X.509 certificate. | |||||
CVE-2011-2900 | 3 Shttpd, Valenok, Yassl | 3 Shttpd, Mongoose, Yasslews | 2017-08-28 | 7.5 HIGH | N/A |
Stack-based buffer overflow in the (1) put_dir function in mongoose.c in Mongoose 3.0, (2) put_dir function in yasslEWS.c in yaSSL Embedded Web Server (yasslEWS) 0.2, and (3) _shttpd_put_dir function in io_dir.c in Simple HTTPD (shttpd) 1.42 allows remote attackers to execute arbitrary code via an HTTP PUT request, as exploited in the wild in 2011. | |||||
CVE-2014-2900 | 1 Yassl | 1 Cyassl | 2017-06-30 | 5.8 MEDIUM | N/A |
wolfSSL CyaSSL before 2.9.4 does not properly validate X.509 certificates with unknown critical extensions, which allows man-in-the-middle attackers to spoof servers via crafted X.509 certificate. | |||||
CVE-2014-2899 | 1 Yassl | 1 Cyassl | 2017-06-30 | 5.0 MEDIUM | N/A |
wolfSSL CyaSSL before 2.9.4 allows remote attackers to cause a denial of service (NULL pointer dereference) via (1) a request for the peer certificate when a certificate parsing failure occurs or (2) a client_key_exchange message when the ephemeral key is not found. | |||||
CVE-2013-1623 | 1 Yassl | 1 Cyassl | 2014-02-20 | 4.3 MEDIUM | N/A |
The TLS and DTLS implementations in wolfSSL CyaSSL before 2.5.0 do not properly consider timing side-channel attacks on a noncompliant MAC check operation during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, a related issue to CVE-2013-0169. | |||||
CVE-2005-3731 | 1 Yassl | 1 Yassl | 2008-09-05 | 10.0 HIGH | N/A |
Unspecified vulnerability in yaSSL before 1.0.6 has unknown impact and attack vectors, related to "certificate chain processing." |