Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).
CVE-2012-2110 — Improper Restriction of Operations within the Bounds of a Memory Buffer in Openssl
Severity
7.5HIGHNVD
EPSS
8.7%
top 7.48%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedApr 19
Latest updateMay 14
Description
The asn1_d2i_read_bio function in crypto/asn1/a_d2i_fp.c in OpenSSL before 0.9.8v, 1.0.0 before 1.0.0i, and 1.0.1 before 1.0.1a does not properly interpret integer data, which allows remote attackers to conduct buffer overflow attacks, and cause a denial of service (memory corruption) or possibly have unspecified other impact, via crafted DER data, as demonstrated by an X.509 certificate or an RSA public key.
CVSS vector
AV:N/AC:L/C:P/I:P/A:PExploitability: 10.0 | Impact: 6.4
Affected Packages3 packages
🔴Vulnerability Details
3💥Exploits & PoCs
1📋Vendor Advisories
5Debian▶
CVE-2012-2110: openssl - The asn1_d2i_read_bio function in crypto/asn1/a_d2i_fp.c in OpenSSL before 0.9.8...↗2012
💬Community
5Bugzilla▶
CVE-2012-2110 mingw32-openssl: asn1_d2i_read_bio integer errors leading to buffer overflow [epel-5]↗2012-04-24
Bugzilla▶
CVE-2012-2110 openssl: asn1_d2i_read_bio integer errors leading to buffer overflow [fedora-all]↗2012-04-19
Bugzilla
▶
Bugzilla▶
CVE-2012-2110 mingw32-openssl: asn1_d2i_read_bio integer errors leading to buffer overflow [fedora-all]↗2012-04-19