-
Notifications
You must be signed in to change notification settings - Fork 0
Multiple OpenSSL Vulnerabilities
This page provides a comprehensive overview of multiple vulnerabilities affecting various versions of OpenSSL, a widely used library for implementing SSL and TLS protocols. These vulnerabilities range from buffer overflows and use-after-free errors to insufficient validation of input, which can lead to denial of service, information disclosure, or remote code execution.
- OpenSSL 1.0.2 < 1.0.2zj Vulnerability
- OpenSSL 1.1.1 < 1.1.1l Vulnerability
- OpenSSL 1.1.1 < 1.1.1m Vulnerability
- OpenSSL 1.1.1 < 1.1.1n Vulnerability
- OpenSSL 1.1.1 < 1.1.1o Vulnerability
- OpenSSL 1.1.1 < 1.1.1p Vulnerability
- OpenSSL 1.1.1 < 1.1.1q Vulnerability
- OpenSSL 1.1.1 < 1.1.1t Multiple Vulnerabilities
- OpenSSL 1.1.1 < 1.1.1u Multiple Vulnerabilities
- OpenSSL 1.1.1 < 1.1.1u Multiple Vulnerabilities
- OpenSSL 1.1.1 < 1.1.1v Vulnerability
- OpenSSL 1.1.1 < 1.1.1x Vulnerability
- OpenSSL 3.0.0 < 3.0.10 Multiple Vulnerabilities
- OpenSSL 3.0.0 < 3.0.11 Vulnerability
- OpenSSL 3.0.0 < 3.0.12 Vulnerability
- OpenSSL 3.0.0 < 3.0.13 Vulnerability
- OpenSSL 3.1.0 < 3.1.3 Vulnerability
- OpenSSL 3.1.0 < 3.1.4 Vulnerability
- OpenSSL 3.1.0 < 3.1.5 Vulnerability
The impact of these vulnerabilities varies but generally includes:
- Denial of Service (DoS): Crash the service or consume excessive system resources, rendering the system unresponsive.
- Information Disclosure: Expose sensitive information to an attacker, such as private keys or user data.
- Remote Code Execution: Allow attackers to execute arbitrary code on the system, potentially gaining full control.
The following versions of OpenSSL are affected by various vulnerabilities:
- OpenSSL 1.0.2 series (up to 1.0.2zj)
- OpenSSL 1.1.1 series (from 1.1.1l to 1.1.1x)
- OpenSSL 3.0.0 series (up to 3.0.13)
- OpenSSL 3.1.0 series (up to 3.1.5)
The primary mitigation for these vulnerabilities is to upgrade to the latest patched versions of OpenSSL. Ensure you download the latest versions from the official OpenSSL website.
- OpenSSL 1.0.2: Upgrade to the latest provided version if you are using this for compatibility reasons.
- OpenSSL 1.1.1: Users should upgrade to the latest 1.1.1 series release.
- OpenSSL 3.x: Upgrade to the latest release available in the 3.0 or 3.1 series.
- Disable deprecated protocols and ciphers that contribute to vulnerabilities.
- Use strong configuration settings in your SSL/TLS deployment to reduce the risk of exploitation.
- Regularly check for security updates related to OpenSSL and apply them as soon as they are available.
- Subscribe to OpenSSL mailing lists to stay informed about new releases and security advisories.
Check OpenSSL Version in bash:
openssl version
Update OpenSSL on Ubuntu/Debian in bash:
sudo apt-get update && sudo apt-get install --only-upgrade openssl
Update OpenSSL on CentOS/Red Hat in bash:
sudo yum update openssl
- Home - Return to this main page.
- Explore detailed vulnerability categories and entries via the sidebar.
- Microsoft Teams < 1.6.0.11166 Information Disclosure↗
- Microsoft Teams < 1.6.0.18681 RCE↗
- Microsoft Windows Unquoted Service Path Enumeration↗
- Microsoft XML Parser (MSXML) and XML Core Services Unsupported↗
- Security Updates for Microsoft .NET Framework↗
- Security Updates for Microsoft Office Products C2R↗
- Security Updates for Microsoft SQL Server↗
- Windows Defender Antimalware/Antivirus Signature Definition Check↗
- Windows Speculative Execution Configuration Check↗
- WinVerifyTrust Signature Validation CVE-2013-3900 Mitigation↗
- SSL Certificate Cannot Be Trusted↗
- SSL Certificate Chain Contains RSA Keys Less Than 2048 bits↗
- SSL Certificate with Wrong Hostname↗
- SSL Medium Strength Cipher Suites Supported (SWEET32)↗
- SSL Self-Signed Certificate↗
- SSL/TLS Diffie-Hellman Modulus <= 1024 Bits (Logjam)↗
- TLS Version 1.0 Protocol Detection↗
- TLS Version 1.1 Protocol Deprecated↗
- Apache 2.4.x < 2.4.58 Multiple Vulnerabilities↗
- Apache Log4j Vulnerabilities↗
- Apache Solr Unauthenticated Access Information Disclosure↗
- Apache Struts Vulnerabilities↗
- Apache Tomcat Vulnerabilities↗
- Amazon Corretto Java 11.x < 11.0.19.7.1 Multiple Vulnerabilities↗
- OpenJDK Vulnerabilities↗
- Oracle Java SE Vulnerabilities↗
- 7-Zip < 23.00 Multiple Vulnerabilities↗
- Adobe Acrobat Vulnerabilities↗
- AMQP Cleartext Authentication↗
- Artifex Ghostscript < 10.2.1 DoS↗
- Chargen UDP Service Remote DoS↗
- Curl 7.84 <= 8.2.1 Header DoS (CVE-2023-38039)↗
- Echo Service Detection↗
- HSTS Missing From HTTPS Server (RFC 6797)↗
- HTTP TRACE / TRACK Methods Allowed↗
- Insecure Windows Service Permissions↗
- Keepass < 2.54 Information disclosure↗
- Notepad++ < 8.5.7 Multiple Buffer Overflow Vulnerabilities↗
- Quote of the Day (QOTD) Service Detection↗
- VMware Tools 10.3.x / 11.x / 12.x < 12.3.5 Token Bypass↗
- X Server Detection↗
- Template -> Use this template for new vulnerabilities