- Description
- RSA verification recovery in the EVP_PKEY_verify_recover function in OpenSSL 1.x before 1.0.0a, as used by pkeyutl and possibly other applications, returns uninitialized memory upon failure, which might allow context-dependent attackers to bypass intended key requirements or obtain sensitive information via unspecified vectors. NOTE: some of these details are obtained from third party information.
- Source
- secalert@redhat.com
- NVD status
- Modified
CVSS 2.0
- Type
- Primary
- Base score
- 6.4
- Impact score
- 4.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:P/A:N
- nvd@nist.gov
- CWE-264
- Hype score
- Not currently trending
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openssl:openssl:1.0.0:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "2FBD8C92-6138-4274-ACBA-D7D42DAEC5AC"
},
{
"criteria": "cpe:2.3:a:openssl:openssl:1.0.0:beta1:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "3A2075BD-6102-4B0F-839A-836E9585F43B"
},
{
"criteria": "cpe:2.3:a:openssl:openssl:1.0.0:beta2:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "2A2FA09E-2BF7-4968-B62D-00DA57F81EA1"
},
{
"criteria": "cpe:2.3:a:openssl:openssl:1.0.0:beta3:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "F02E634E-1E3D-4E44-BADA-76F92483A732"
},
{
"criteria": "cpe:2.3:a:openssl:openssl:1.0.0:beta4:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "FCC2B07A-49EF-411F-8A4D-89435E22B043"
},
{
"criteria": "cpe:2.3:a:openssl:openssl:1.0.0:beta5:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "7E9480D6-3B6A-4C41-B8C1-C3F945040772"
}
],
"operator": "OR"
}
]
}
]