First published: Fri Jan 06 2012(Updated: )
The GOST ENGINE in OpenSSL before 1.0.0f does not properly handle invalid parameters for the GOST block cipher, which allows remote attackers to cause a denial of service (daemon crash) via crafted data from a TLS client.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
OpenSSL libcrypto | <=1.0.0e | |
OpenSSL libcrypto | =0.9.1c | |
OpenSSL libcrypto | =0.9.2b | |
OpenSSL libcrypto | =0.9.3 | |
OpenSSL libcrypto | =0.9.3a | |
OpenSSL libcrypto | =0.9.4 | |
OpenSSL libcrypto | =0.9.5 | |
OpenSSL libcrypto | =0.9.5a | |
OpenSSL libcrypto | =0.9.6 | |
OpenSSL libcrypto | =0.9.6a | |
OpenSSL libcrypto | =0.9.6b | |
OpenSSL libcrypto | =0.9.6c | |
OpenSSL libcrypto | =0.9.6d | |
OpenSSL libcrypto | =0.9.6e | |
OpenSSL libcrypto | =0.9.6f | |
OpenSSL libcrypto | =0.9.6g | |
OpenSSL libcrypto | =0.9.6h | |
OpenSSL libcrypto | =0.9.6h-bogus | |
OpenSSL libcrypto | =0.9.6i | |
OpenSSL libcrypto | =0.9.6j | |
OpenSSL libcrypto | =0.9.6k | |
OpenSSL libcrypto | =0.9.6l | |
OpenSSL libcrypto | =0.9.6m | |
OpenSSL libcrypto | =0.9.7 | |
OpenSSL libcrypto | =0.9.7a | |
OpenSSL libcrypto | =0.9.7b | |
OpenSSL libcrypto | =0.9.7c | |
OpenSSL libcrypto | =0.9.7d | |
OpenSSL libcrypto | =0.9.7e | |
OpenSSL libcrypto | =0.9.7f | |
OpenSSL libcrypto | =0.9.7g | |
OpenSSL libcrypto | =0.9.7h | |
OpenSSL libcrypto | =0.9.7i | |
OpenSSL libcrypto | =0.9.7j | |
OpenSSL libcrypto | =0.9.7k | |
OpenSSL libcrypto | =0.9.7l | |
OpenSSL libcrypto | =0.9.7m | |
OpenSSL libcrypto | =0.9.8 | |
OpenSSL libcrypto | =0.9.8a | |
OpenSSL libcrypto | =0.9.8b | |
OpenSSL libcrypto | =0.9.8c | |
OpenSSL libcrypto | =0.9.8d | |
OpenSSL libcrypto | =0.9.8e | |
OpenSSL libcrypto | =0.9.8f | |
OpenSSL libcrypto | =0.9.8g | |
OpenSSL libcrypto | =0.9.8h | |
OpenSSL libcrypto | =0.9.8i | |
OpenSSL libcrypto | =0.9.8j | |
OpenSSL libcrypto | =0.9.8k | |
OpenSSL libcrypto | =0.9.8l | |
OpenSSL libcrypto | =0.9.8m | |
OpenSSL libcrypto | =0.9.8n | |
OpenSSL libcrypto | =0.9.8o | |
OpenSSL libcrypto | =0.9.8p | |
OpenSSL libcrypto | =0.9.8q | |
OpenSSL libcrypto | =0.9.8r | |
OpenSSL libcrypto | =0.9.8s | |
OpenSSL libcrypto | =1.0.0 | |
OpenSSL libcrypto | =1.0.0-beta1 | |
OpenSSL libcrypto | =1.0.0-beta2 | |
OpenSSL libcrypto | =1.0.0-beta3 | |
OpenSSL libcrypto | =1.0.0-beta4 | |
OpenSSL libcrypto | =1.0.0-beta5 | |
OpenSSL libcrypto | =1.0.0a | |
OpenSSL libcrypto | =1.0.0b | |
OpenSSL libcrypto | =1.0.0c | |
OpenSSL libcrypto | =1.0.0d |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-0027 has a severity rating that indicates it can lead to a denial of service due to the inability of OpenSSL to properly handle invalid parameters.
To fix CVE-2012-0027, upgrade to OpenSSL version 1.0.0f or later that includes fixes for the vulnerability.
CVE-2012-0027 affects OpenSSL versions prior to 1.0.0f, including 0.9.1c, 0.9.2b, and multiple versions up to 1.0.0e.
CVE-2012-0027 enables remote attackers to execute a denial of service attack that causes the daemon to crash.
Yes, CVE-2012-0027 can be triggered by crafted data sent from a TLS client, exploiting the vulnerability in the GOST ENGINE.