![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.112946 |
Category: | General |
Title: | OpenSSL: Invalid Return value check in pkey_rsa_verifyrecover (20100601) - Linux |
Summary: | OpenSSL is prone to an invalid return value check. |
Description: | Summary: OpenSSL is prone to an invalid return value check. Vulnerability Insight: When verification recovery fails for RSA keys an uninitialised buffer with an undefined length is returned instead of an error code. Affected Software/OS: OpenSSL 1.0.0. Solution: Update to version 1.0.0a or later. CVSS Score: 6.4 CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:N |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2010-1633 40024 http://secunia.com/advisories/40024 40503 http://www.securityfocus.com/bid/40503 57353 http://secunia.com/advisories/57353 ADV-2010-1313 http://www.vupen.com/english/advisories/2010/1313 http://cvs.openssl.org/chngview?cn=19693 http://cvs.openssl.org/filediff?f=openssl/crypto/rsa/rsa_pmeth.c&v1=1.34&v2=1.34.2.1 http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004564 http://www.openssl.org/news/secadv_20100601.txt https://bugzilla.redhat.com/show_bug.cgi?id=598732 |
Copyright | Copyright (C) 2021 Greenbone Networks GmbH |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |