6.8
CVSSv2

CVE-2018-1000807

Published: 08/10/2018 Updated: 17/11/2023
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
CVSS v3 Base Score: 8.1 | Impact Score: 5.9 | Exploitability Score: 2.2
VMScore: 605
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

Python Cryptographic Authority pyopenssl version prior to version 17.5.0 contains a CWE-416: Use After Free vulnerability in X509 object handling that can result in Use after free can lead to possible denial of service or remote code execution.. This attack appear to be exploitable via Depends on the calling application and if it retains a reference to the memory.. This vulnerability appears to have been fixed in 17.5.0.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

pyopenssl pyopenssl

canonical ubuntu linux 16.04

redhat enterprise linux desktop 7.0

redhat enterprise linux workstation 7.0

redhat enterprise linux server 7.0

redhat openstack 13

Vendor Advisories

Synopsis Moderate: pyOpenSSL security and bug fix update Type/Severity Security Advisory: Moderate Topic An update for pyOpenSSL is now available for Red Hat OpenStack Platform 130 (Queens)Red Hat Product Security has rated this update as having a security impact of Moderate A Common Vulnerability Scorin ...
Several security issues were fixed in pyOpenSSL ...