CVE-2012-2110
Published: 19 April 2012
The asn1_d2i_read_bio function in crypto/asn1/a_d2i_fp.c in OpenSSL before 0.9.8v, 1.0.0 before 1.0.0i, and 1.0.1 before 1.0.1a does not properly interpret integer data, which allows remote attackers to conduct buffer overflow attacks, and cause a denial of service (memory corruption) or possibly have unspecified other impact, via crafted DER data, as demonstrated by an X.509 certificate or an RSA public key.
Priority
Status
Package | Release | Status |
---|---|---|
openssl Launchpad, Ubuntu, Debian |
hardy |
Released
(0.9.8g-4ubuntu3.17)
|
lucid |
Released
(0.9.8k-7ubuntu8.10)
|
|
natty |
Released
(0.9.8o-5ubuntu1.4)
|
|
oneiric |
Released
(1.0.0e-2ubuntu4.4)
|
|
upstream |
Needs triage
|
|
Patches: upstream: http://cvs.openssl.org/chngview?cn=22439 |
||
openssl098 Launchpad, Ubuntu, Debian |
hardy |
Does not exist
|
lucid |
Does not exist
|
|
natty |
Does not exist
|
|
oneiric |
Released
(0.9.8o-7ubuntu1.2)
|
|
upstream |
Needs triage
|