CVE-2012-0027
Published: 5 January 2012
The GOST ENGINE in OpenSSL before 1.0.0f does not properly handle invalid parameters for the GOST block cipher, which allows remote attackers to cause a denial of service (daemon crash) via crafted data from a TLS client.
Notes
Author | Note |
---|---|
sbeattie | GOST is not in openssl 0.9.8 |
Priority
Status
Package | Release | Status |
---|---|---|
openssl Launchpad, Ubuntu, Debian |
upstream |
Released
(0.9.8s,1.0.0f)
|
hardy |
Not vulnerable
(openssl 1.0 only)
|
|
lucid |
Not vulnerable
(openssl 1.0 only)
|
|
maverick |
Not vulnerable
(openssl 1.0 only)
|
|
natty |
Not vulnerable
(openssl 1.0 only)
|
|
oneiric |
Released
(1.0.0e-2ubuntu4.2)
|
|
Patches: upstream: http://cvs.openssl.org/chngview?cn=21925 |
||
openssl098 Launchpad, Ubuntu, Debian |
upstream |
Released
(0.9.8s)
|
hardy |
Does not exist
|
|
lucid |
Does not exist
|
|
maverick |
Does not exist
|
|
natty |
Does not exist
|
|
oneiric |
Not vulnerable
(openssl 1.0 only)
|