Search CVE reports


Toggle filters

161 – 170 of 453 results


CVE-2017-15906

Low priority

Some fixes available 10 of 11

The process_open function in sftp-server.c in OpenSSH before 7.6 does not properly prevent write operations in readonly mode, which allows attackers to create zero-length files.

1 affected package

openssh

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
openssh Fixed Fixed
Show less packages

CVE-2017-7805

Medium priority
Fixed

During TLS 1.2 exchanges, handshake hashes are generated which point to a message buffer. This saved data is used for later messages but in some cases, the handshake transcript can exceed the space available in the current buffer,...

3 affected packages

firefox, thunderbird, nss

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
firefox Fixed
thunderbird Fixed
nss Fixed
Show less packages

CVE-2017-3735

Low priority
Fixed

While parsing an IPAddressFamily extension in an X.509 certificate, it is possible to do a one-byte overread. This would result in an incorrect text display of the certificate. This bug has been present since 2006 and is present...

3 affected packages

openssl, openssl098, openssl1.0

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
openssl Fixed
openssl098 Not in release
openssl1.0 Not affected
Show less packages

CVE-2015-3277

Medium priority
Vulnerable

The mod_nss module before 1.0.11 in Fedora allows remote attackers to obtain cipher lists due to incorrect parsing of multi-keyword cipherstring.

1 affected package

libapache2-mod-nss

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
libapache2-mod-nss Not in release Not in release Not in release Vulnerable
Show less packages

CVE-2015-5244

Medium priority
Ignored

The NSSCipherSuite option with ciphersuites enabled in mod_nss before 1.0.12 allows remote attackers to bypass application restrictions.

1 affected package

libapache2-mod-nss

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
libapache2-mod-nss Not affected
Show less packages

CVE-2016-3099

Medium priority
Vulnerable

mod_ns in Red Hat Enterprise Linux Desktop 7, Red Hat Enterprise Linux HPC Node 7, Red Hat Enterprise Linux Server 7, and Red Hat Enterprise Linux Workstation 7 allows remote attackers to force the use of ciphers that were not...

1 affected package

libapache2-mod-nss

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
libapache2-mod-nss Not in release Not in release Not in release Not affected
Show less packages

CVE-2017-7502

Medium priority
Fixed

Null pointer dereference vulnerability in NSS since 3.24.0 was found when server receives empty SSLv2 messages resulting into denial of service by remote attacker.

1 affected package

nss

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
nss
Show less packages

CVE-2017-3733

High priority
Not affected

During a renegotiation handshake if the Encrypt-Then-Mac extension is negotiated where it was not in the original handshake (or vice-versa) then this can cause OpenSSL 1.1.0 before 1.1.0e to crash (dependent on ciphersuite). Both...

2 affected packages

openssl, openssl098

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
openssl
openssl098
Show less packages

CVE-2017-3730

Medium priority
Not affected

In OpenSSL 1.1.0 before 1.1.0d, if a malicious server supplies bad parameters for a DHE or ECDHE key exchange then this can result in the client attempting to dereference a NULL pointer leading to a client crash. This could be...

2 affected packages

openssl, openssl098

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
openssl
openssl098
Show less packages

CVE-2016-7054

Medium priority
Not affected

In OpenSSL 1.1.0 before 1.1.0c, TLS connections using *-CHACHA20-POLY1305 ciphersuites are susceptible to a DoS attack by corrupting larger payloads. This can result in an OpenSSL crash. This issue is not considered to...

3 affected packages

openssl, openssl098, openssl1.0

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
openssl
openssl098
openssl1.0
Show less packages