CVE-2012-2333

Integer underflow in OpenSSL before 0.9.8x, 1.0.0 before 1.0.0j, and 1.0.1 before 1.0.1c, when TLS 1.1, TLS 1.2, or DTLS is used with CBC encryption, allows remote attackers to cause a denial of service (buffer over-read) or possibly have unspecified other impact via a crafted TLS packet that is not properly handled during a certain explicit IV calculation.
References
Link Resource
http://cvs.openssl.org/chngview?cn=22538
http://cvs.openssl.org/chngview?cn=22547
http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html
http://lists.fedoraproject.org/pipermail/package-announce/2012-May/081460.html
http://lists.fedoraproject.org/pipermail/package-announce/2012-November/092905.html
http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00019.html
http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00020.html
http://marc.info/?l=bugtraq&m=134919053717161&w=2
http://marc.info/?l=bugtraq&m=134919053717161&w=2
http://marc.info/?l=bugtraq&m=136432043316835&w=2
http://marc.info/?l=bugtraq&m=136432043316835&w=2
http://rhn.redhat.com/errata/RHSA-2012-0699.html
http://rhn.redhat.com/errata/RHSA-2012-1306.html
http://rhn.redhat.com/errata/RHSA-2012-1307.html
http://rhn.redhat.com/errata/RHSA-2012-1308.html
http://secunia.com/advisories/49116
http://secunia.com/advisories/49208
http://secunia.com/advisories/49324
http://secunia.com/advisories/50768
http://secunia.com/advisories/51312
http://support.apple.com/kb/HT5784
http://www.cert.fi/en/reports/2012/vulnerability641549.html
http://www.debian.org/security/2012/dsa-2475
http://www.kb.cert.org/vuls/id/737740 US Government Resource
http://www.mandriva.com/security/advisories?name=MDVSA-2012:073
http://www.openssl.org/news/secadv_20120510.txt
http://www.securityfocus.com/bid/53476
http://www.securitytracker.com/id?1027057
https://bugzilla.redhat.com/show_bug.cgi?id=820686
https://exchange.xforce.ibmcloud.com/vulnerabilities/75525
http://cvs.openssl.org/chngview?cn=22538
http://cvs.openssl.org/chngview?cn=22547
http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html
http://lists.fedoraproject.org/pipermail/package-announce/2012-May/081460.html
http://lists.fedoraproject.org/pipermail/package-announce/2012-November/092905.html
http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00019.html
http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00020.html
http://marc.info/?l=bugtraq&m=134919053717161&w=2
http://marc.info/?l=bugtraq&m=134919053717161&w=2
http://marc.info/?l=bugtraq&m=136432043316835&w=2
http://marc.info/?l=bugtraq&m=136432043316835&w=2
http://rhn.redhat.com/errata/RHSA-2012-0699.html
http://rhn.redhat.com/errata/RHSA-2012-1306.html
http://rhn.redhat.com/errata/RHSA-2012-1307.html
http://rhn.redhat.com/errata/RHSA-2012-1308.html
http://secunia.com/advisories/49116
http://secunia.com/advisories/49208
http://secunia.com/advisories/49324
http://secunia.com/advisories/50768
http://secunia.com/advisories/51312
http://support.apple.com/kb/HT5784
http://www.cert.fi/en/reports/2012/vulnerability641549.html
http://www.debian.org/security/2012/dsa-2475
http://www.kb.cert.org/vuls/id/737740 US Government Resource
http://www.mandriva.com/security/advisories?name=MDVSA-2012:073
http://www.openssl.org/news/secadv_20120510.txt
http://www.securityfocus.com/bid/53476
http://www.securitytracker.com/id?1027057
https://bugzilla.redhat.com/show_bug.cgi?id=820686
https://exchange.xforce.ibmcloud.com/vulnerabilities/75525
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.1c:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.2b:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.3:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.3a:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.4:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.5:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.5:beta1:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.5:beta2:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.5a:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.5a:beta1:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.5a:beta2:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6:beta1:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6:beta2:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6:beta3:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6a:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6a:beta1:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6a:beta2:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6a:beta3:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6b:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6c:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6d:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6e:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6f:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6g:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6h:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6i:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6j:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6k:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6l:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.6m:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7:beta1:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7:beta2:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7:beta3:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7:beta4:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7:beta5:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7:beta6:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7a:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7b:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7c:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7d:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7e:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7f:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7g:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7h:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7i:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7j:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7k:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7l:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.7m:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8a:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8b:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8c:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8d:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8e:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8f:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8g:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8h:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8i:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8j:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8k:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8l:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8m:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8m:beta1:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8n:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8o:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8p:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8q:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8r:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8s:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8t:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8u:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:0.9.8v:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openssl:0.9.6-15:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openssl:0.9.6b-3:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openssl:0.9.7a-2:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:openssl:openssl:1.0.0:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.0:beta1:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.0:beta2:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.0:beta3:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.0:beta4:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.0:beta5:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.0a:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.0b:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.0c:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.0d:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.0e:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.0f:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.0g:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.0h:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:a:openssl:openssl:1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.1:beta1:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.1:beta2:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.1:beta3:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.1a:*:*:*:*:*:*:*
cpe:2.3:a:openssl:openssl:1.0.1b:*:*:*:*:*:*:*

History

21 Nov 2024, 01:38

Type Values Removed Values Added
References () http://cvs.openssl.org/chngview?cn=22538 - () http://cvs.openssl.org/chngview?cn=22538 -
References () http://cvs.openssl.org/chngview?cn=22547 - () http://cvs.openssl.org/chngview?cn=22547 -
References () http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html - () http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html -
References () http://lists.fedoraproject.org/pipermail/package-announce/2012-May/081460.html - () http://lists.fedoraproject.org/pipermail/package-announce/2012-May/081460.html -
References () http://lists.fedoraproject.org/pipermail/package-announce/2012-November/092905.html - () http://lists.fedoraproject.org/pipermail/package-announce/2012-November/092905.html -
References () http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00019.html - () http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00019.html -
References () http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00020.html - () http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00020.html -
References () http://marc.info/?l=bugtraq&m=134919053717161&w=2 - () http://marc.info/?l=bugtraq&m=134919053717161&w=2 -
References () http://marc.info/?l=bugtraq&m=136432043316835&w=2 - () http://marc.info/?l=bugtraq&m=136432043316835&w=2 -
References () http://rhn.redhat.com/errata/RHSA-2012-0699.html - () http://rhn.redhat.com/errata/RHSA-2012-0699.html -
References () http://rhn.redhat.com/errata/RHSA-2012-1306.html - () http://rhn.redhat.com/errata/RHSA-2012-1306.html -
References () http://rhn.redhat.com/errata/RHSA-2012-1307.html - () http://rhn.redhat.com/errata/RHSA-2012-1307.html -
References () http://rhn.redhat.com/errata/RHSA-2012-1308.html - () http://rhn.redhat.com/errata/RHSA-2012-1308.html -
References () http://secunia.com/advisories/49116 - () http://secunia.com/advisories/49116 -
References () http://secunia.com/advisories/49208 - () http://secunia.com/advisories/49208 -
References () http://secunia.com/advisories/49324 - () http://secunia.com/advisories/49324 -
References () http://secunia.com/advisories/50768 - () http://secunia.com/advisories/50768 -
References () http://secunia.com/advisories/51312 - () http://secunia.com/advisories/51312 -
References () http://support.apple.com/kb/HT5784 - () http://support.apple.com/kb/HT5784 -
References () http://www.cert.fi/en/reports/2012/vulnerability641549.html - () http://www.cert.fi/en/reports/2012/vulnerability641549.html -
References () http://www.debian.org/security/2012/dsa-2475 - () http://www.debian.org/security/2012/dsa-2475 -
References () http://www.kb.cert.org/vuls/id/737740 - US Government Resource () http://www.kb.cert.org/vuls/id/737740 - US Government Resource
References () http://www.mandriva.com/security/advisories?name=MDVSA-2012:073 - () http://www.mandriva.com/security/advisories?name=MDVSA-2012:073 -
References () http://www.openssl.org/news/secadv_20120510.txt - () http://www.openssl.org/news/secadv_20120510.txt -
References () http://www.securityfocus.com/bid/53476 - () http://www.securityfocus.com/bid/53476 -
References () http://www.securitytracker.com/id?1027057 - () http://www.securitytracker.com/id?1027057 -
References () https://bugzilla.redhat.com/show_bug.cgi?id=820686 - () https://bugzilla.redhat.com/show_bug.cgi?id=820686 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/75525 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/75525 -

Information

Published : 2012-05-14 22:55

Updated : 2024-11-21 01:38


NVD link : CVE-2012-2333

Mitre link : CVE-2012-2333

CVE.ORG link : CVE-2012-2333


JSON object : View

Products Affected

redhat

  • openssl

openssl

  • openssl
CWE
CWE-189

Numeric Errors