While parsing an IPAddressFamily extension in an X.509 certificate, it is possible to do a one-byte overread. This would result in an incorrect text display of the certificate. This bug has been present since 2006 and is present in all versions of OpenSSL prior to 1.0.2m and 1.1.0g.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
openssl openssl 1.1.0e |
||
openssl openssl 0.9.8ze |
||
openssl openssl 1.0.2a |
||
openssl openssl 0.9.8b |
||
openssl openssl 1.0.1j |
||
openssl openssl 0.9.7l |
||
openssl openssl 0.9.8m |
||
openssl openssl 1.1.0f |
||
openssl openssl 1.0.0n |
||
openssl openssl 1.0.1 |
||
openssl openssl 0.9.8c |
||
openssl openssl 1.0.0c |
||
openssl openssl 1.0.0i |
||
openssl openssl 1.0.0 |
||
openssl openssl 1.0.1h |
||
openssl openssl 0.9.8n |
||
openssl openssl 0.9.8p |
||
openssl openssl 1.0.2e |
||
openssl openssl 1.0.2j |
||
openssl openssl 1.0.0m |
||
openssl openssl 1.0.2b |
||
openssl openssl 1.0.1c |
||
openssl openssl 0.9.7j |
||
openssl openssl 0.9.8e |
||
openssl openssl 0.9.8u |
||
openssl openssl 0.9.8za |
||
openssl openssl 1.0.1g |
||
openssl openssl 0.9.8g |
||
openssl openssl 1.0.0h |
||
openssl openssl 0.9.8k |
||
openssl openssl 0.9.8d |
||
openssl openssl 1.0.0e |
||
openssl openssl 1.0.0f |
||
openssl openssl 0.9.8j |
||
openssl openssl 1.1.0c |
||
openssl openssl 1.0.0d |
||
openssl openssl 0.9.7k |
||
openssl openssl 1.0.0j |
||
openssl openssl 0.9.8s |
||
openssl openssl 1.0.0p |
||
openssl openssl 1.0.1a |
||
openssl openssl 1.0.0s |
||
openssl openssl 1.0.2h |
||
openssl openssl 1.0.0o |
||
openssl openssl 0.9.8l |
||
openssl openssl 0.9.8zc |
||
openssl openssl 1.0.1d |
||
openssl openssl 1.0.0k |
||
openssl openssl 0.9.8r |
||
openssl openssl 1.0.2c |
||
openssl openssl 0.9.8t |
||
openssl openssl 0.9.8z |
||
openssl openssl 1.1.0b |
||
openssl openssl 1.1.0d |
||
openssl openssl 0.9.8a |
||
openssl openssl 1.1.0 |
||
openssl openssl 1.0.2 |
||
openssl openssl 0.9.7m |
||
openssl openssl 1.0.1k |
||
openssl openssl 1.0.1b |
||
openssl openssl 1.1.0a |
||
openssl openssl 0.9.8zb |
||
openssl openssl 0.9.8o |
||
openssl openssl 0.9.8q |
||
openssl openssl 0.9.8w |
||
openssl openssl 1.0.1e |
||
openssl openssl 1.0.1l |
||
openssl openssl 0.9.8 |
||
openssl openssl 1.0.1f |
||
openssl openssl 1.0.0l |
||
openssl openssl 0.9.8v |
||
openssl openssl 1.0.0r |
||
openssl openssl 0.9.8i |
||
openssl openssl 0.9.8f |
||
openssl openssl 0.9.8y |
||
openssl openssl 1.0.0a |
||
openssl openssl 1.0.0q |
||
openssl openssl 0.9.8h |
||
openssl openssl 0.9.8zg |
||
openssl openssl 1.0.2f |
||
openssl openssl 0.9.8x |
||
openssl openssl 1.0.1i |
||
openssl openssl 1.0.0b |
||
openssl openssl 1.0.2i |
||
openssl openssl 1.0.0g |
||
openssl openssl 1.0.2d |
||
openssl openssl 1.0.2k |
||
openssl openssl 1.0.2l |
||
debian debian linux 8.0 |
||
debian debian linux 9.0 |
Oil, gas, maritime systems affected by latest bug findings Yes, you can remotely hack factory, building site cranes. Wait, what?
Companies running a popular brand of industrial Ethernet switch are being advised to update their firmware ASAP following a series of bug disclosures. Security house Positive Technologies took credit today for the discovery of six CVE-listed security vulnerabilities in the Phoenix Contact FL Switch 3xxx, 4xxx, and 48xx industrial control switches. The flaws are addressed in firmware versions 1.35 or newer. Among the now-patched flaws were several Positive described as "critical" security risks t...