CVE-2010-1633
Published Jun 3, 2010
Last updated a year ago
Overview
- Description
- RSA verification recovery in the EVP_PKEY_verify_recover function in OpenSSL 1.x before 1.0.0a, as used by pkeyutl and possibly other applications, returns uninitialized memory upon failure, which might allow context-dependent attackers to bypass intended key requirements or obtain sensitive information via unspecified vectors. NOTE: some of these details are obtained from third party information.
- Source
- secalert@redhat.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 6.4
- Impact score
- 4.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:P/A:N
Weaknesses
- nvd@nist.gov
- CWE-264
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:openssl:openssl:1.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2FBD8C92-6138-4274-ACBA-D7D42DAEC5AC" }, { "criteria": "cpe:2.3:a:openssl:openssl:1.0.0:beta1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3A2075BD-6102-4B0F-839A-836E9585F43B" }, { "criteria": "cpe:2.3:a:openssl:openssl:1.0.0:beta2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2A2FA09E-2BF7-4968-B62D-00DA57F81EA1" }, { "criteria": "cpe:2.3:a:openssl:openssl:1.0.0:beta3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F02E634E-1E3D-4E44-BADA-76F92483A732" }, { "criteria": "cpe:2.3:a:openssl:openssl:1.0.0:beta4:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FCC2B07A-49EF-411F-8A4D-89435E22B043" }, { "criteria": "cpe:2.3:a:openssl:openssl:1.0.0:beta5:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7E9480D6-3B6A-4C41-B8C1-C3F945040772" } ], "operator": "OR" } ] } ]