First published: Mon Mar 12 2012(Updated: )
yaSSL CyaSSL before 2.0.8 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted X.509 certificate.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
yaSSL | <=2.0.6 | |
yaSSL | =0.2.0 | |
yaSSL | =0.3.0 | |
yaSSL | =0.4.0 | |
yaSSL | =0.5.0 | |
yaSSL | =0.5.5 | |
yaSSL | =0.6.0 | |
yaSSL | =0.6.2 | |
yaSSL | =0.6.3 | |
yaSSL | =0.8.0 | |
yaSSL | =0.9.0 | |
yaSSL | =0.9.6 | |
yaSSL | =0.9.8 | |
yaSSL | =0.9.9 | |
yaSSL | =1.0.0-rc1 | |
yaSSL | =1.0.0-rc2 | |
yaSSL | =1.0.0-rc3 | |
yaSSL | =1.0.2 | |
yaSSL | =1.0.3 | |
yaSSL | =1.0.6 | |
yaSSL | =1.1.0 | |
yaSSL | =1.2.0 | |
yaSSL | =1.3.0 | |
yaSSL | =1.4.0 | |
yaSSL | =1.5.0 | |
yaSSL | =1.5.4 | |
yaSSL | =1.5.6 | |
yaSSL | =1.6.0 | |
yaSSL | =1.6.5 | |
yaSSL | =1.8.0 | |
yaSSL | =1.9.0 | |
yaSSL | =2.0.0-rc1 | |
yaSSL | =2.0.0-rc2 | |
yaSSL | =2.0.0-rc3 | |
yaSSL | =2.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-1558 has been classified as a high severity vulnerability due to its potential to cause application crashes through denial of service.
To mitigate CVE-2012-1558, upgrade yaSSL CyaSSL to version 2.0.8 or later.
CVE-2012-1558 can be exploited by remote attackers who send crafted X.509 certificates.
CVE-2012-1558 affects yaSSL CyaSSL versions prior to 2.0.8, including versions like 0.2.0 through 2.0.6.
The impact of CVE-2012-1558 can result in denial of service due to NULL pointer dereference leading to application crashes.