5
CVSSv2

CVE-2012-1165

Published: 15/03/2012 Updated: 13/01/2018
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

The mime_param_cmp function in crypto/asn1/asn_mime.c in OpenSSL prior to 0.9.8u and 1.x prior to 1.0.0h allows remote malicious users to cause a denial of service (NULL pointer dereference and application crash) via a crafted S/MIME message, a different vulnerability than CVE-2006-7250.

Vulnerable Product Search on Vulmon Subscribe to Product

openssl openssl 0.9.8p

openssl openssl 0.9.8o

openssl openssl 0.9.8i

openssl openssl 0.9.8r

openssl openssl 0.9.8q

openssl openssl 0.9.8k

openssl openssl 0.9.8j

openssl openssl 0.9.8b

openssl openssl 0.9.8a

openssl openssl 0.9.7

openssl openssl 0.9.7a

openssl openssl 0.9.7h

openssl openssl 0.9.7i

openssl openssl 0.9.6a

openssl openssl 0.9.6i

openssl openssl 0.9.6h

openssl openssl 0.9.6m

openssl openssl 0.9.6l

openssl openssl 0.9.5

openssl openssl 0.9.3a

openssl openssl 0.9.3

openssl openssl

openssl openssl 0.9.8s

openssl openssl 0.9.8m

openssl openssl 0.9.8l

openssl openssl 0.9.8d

openssl openssl 0.9.8c

openssl openssl 0.9.7m

openssl openssl 0.9.7b

openssl openssl 0.9.7c

openssl openssl 0.9.6g

openssl openssl 0.9.6f

openssl openssl 0.9.6k

openssl openssl 0.9.6j

openssl openssl 0.9.4

openssl openssl 0.9.8h

openssl openssl 0.9.8

openssl openssl 0.9.7f

openssl openssl 0.9.7g

openssl openssl 0.9.7j

openssl openssl 0.9.6

openssl openssl 0.9.6c

openssl openssl 0.9.6b

openssl openssl 0.9.5a

openssl openssl 0.9.2b

openssl openssl 0.9.1c

openssl openssl 0.9.8n

openssl openssl 0.9.8g

openssl openssl 0.9.8f

openssl openssl 0.9.8e

openssl openssl 0.9.7d

openssl openssl 0.9.7e

openssl openssl 0.9.7k

openssl openssl 0.9.7l

openssl openssl 0.9.6e

openssl openssl 0.9.6d

openssl openssl 1.0.0

openssl openssl 1.0.0g

openssl openssl 1.0.0d

openssl openssl 1.0.0e

openssl openssl 1.0.0f

openssl openssl 1.0.0a

openssl openssl 1.0.0b

openssl openssl 1.0.0c

Vendor Advisories

Synopsis Moderate: openssl security and bug fix update Type/Severity Security Advisory: Moderate Topic Updated openssl packages that fix two security issues and one bug are nowavailable for Red Hat Enterprise Linux 5 and 6The Red Hat Security Response Team has rated this update as having moderatesecurity i ...
Debian Bug report logs - #663642 [CVE-2012-1165] openssl: possible NULL dereference on bad MIME headers Package: openssl; Maintainer for openssl is Debian OpenSSL Team <pkg-openssl-devel@listsaliothdebianorg>; Source for openssl is src:openssl (PTS, buildd, popcon) Reported by: Luciano Bello <luciano@debianorg> D ...
An application using OpenSSL could be made to crash or run programs if it opened a specially crafted file ...
A NULL pointer dereference flaw was found in the way OpenSSL parsed Secure/Multipurpose Internet Mail Extensions (S/MIME) messages An attacker could use this flaw to crash an application that uses OpenSSL to decrypt or verify S/MIME messages (CVE-2012-1165) A flaw was found in the PKCS#7 and Cryptographic Message Syntax (CMS) implementations in O ...

Github Repositories

VulDetImp This is an implementation effort for VulDetector Installation curl -fsSL rawgithubusercontentcom/uit-anhvuk13/VulDetImp/master/setupsh | sh Usage Build the environment: /buildsh Run app: /startsh <options> Interact with the