Double free vulnerability in OpenSSL 0.9.8 prior to 0.9.8s, when X509_V_FLAG_POLICY_CHECK is enabled, allows remote malicious users to have an unspecified impact by triggering failure of a policy check.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
openssl openssl 0.9.8r |
||
openssl openssl 0.9.8q |
||
openssl openssl 0.9.8j |
||
openssl openssl 0.9.8i |
||
openssl openssl 0.9.8b |
||
openssl openssl 0.9.8a |
||
openssl openssl 0.9.8n |
||
openssl openssl 0.9.8m |
||
openssl openssl 0.9.8f |
||
openssl openssl 0.9.8e |
||
openssl openssl 0.9.8l |
||
openssl openssl 0.9.8k |
||
openssl openssl 0.9.8d |
||
openssl openssl 0.9.8c |
||
openssl openssl 0.9.8p |
||
openssl openssl 0.9.8o |
||
openssl openssl 0.9.8h |
||
openssl openssl 0.9.8g |
||
openssl openssl 0.9.8 |
We've got three years to shore up election security
DEF CON After the debacle of the 2000 presidential election count, the US invested heavily in electronic voting systems – but not, it seems, the security to protect them. This year at the DEF CON hacking conference in Las Vegas, 30 computer-powered ballot boxes used in American elections were set up in a simulated national White House race – and hackers got to work physically breaking the gear open to find out what was hidden inside. In less than 90 minutes, the first cracks in the systems' ...