Search for vulnerabilities
Vulnerability ID | VCID-tvpy-7bfy-aaad |
Aliases |
CVE-2012-2686
VC-OPENSSL-20130205-CVE-2012-2686 |
Summary | A flaw in the OpenSSL handling of CBC ciphersuites in TLS 1.1 and TLS 1.2 on AES-NI supporting platforms can be exploited in a DoS attack. |
Status | Published |
Exploitability | 2.0 |
Weighted Severity | 4.5 |
Risk | 9.0 |
Affected and Fixed Packages | Package Details |
CWE-310 | Cryptographic Issues |
Data source | Metasploit |
---|---|
Description | The AES-NI implementation of OpenSSL 1.0.1c does not properly compute the length of an encrypted message when used with a TLS version 1.1 or above. This leads to an integer underflow which can cause a DoS. The vulnerable function aesni_cbc_hmac_sha1_cipher is only included in the 64-bit versions of OpenSSL. This module has been tested successfully on Ubuntu 12.04 (64-bit) with the default OpenSSL 1.0.1c package. |
Note | Stability: - crash-service-down SideEffects: [] Reliability: [] |
Ransomware campaign use | Unknown |
Source publication date | Feb. 5, 2013 |
Source URL | https://github.com/rapid7/metasploit-framework/tree/master/modules/auxiliary/dos/ssl/openssl_aesni.rb |
Exploitability (E) | Access Vector (AV) | Access Complexity (AC) | Authentication (Au) | Confidentiality Impact (C) | Integrity Impact (I) | Availability Impact (A) |
---|---|---|---|---|---|---|
high functional unproven proof_of_concept not_defined |
local adjacent_network network |
high medium low |
multiple single none |
none partial complete |
none partial complete |
none partial complete |
Percentile | 0.96324 |
EPSS Score | 0.18334 |
Published At | Nov. 1, 2024, midnight |
Date | Actor | Action | Source | VulnerableCode Version |
---|---|---|---|---|
There are no relevant records. |