CVE-2012-2110
Summary
| CVE | CVE-2012-2110 |
|---|---|
| State | PUBLISHED |
| Assigner | redhat |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2012-04-19 17:55:01 UTC |
| Updated | 2026-04-29 01:13:23 UTC |
| Description | The asn1_d2i_read_bio function in crypto/asn1/a_d2i_fp.c in OpenSSL before 0.9.8v, 1.0.0 before 1.0.0i, and 1.0.1 before 1.0.1a does not properly interpret integer data, which allows remote attackers to conduct buffer overflow attacks, and cause a denial of service (memory corruption) or possibly have unspecified other impact, via crafted DER data, as demonstrated by an X.509 certificate or an RSA public key. |
Risk And Classification
CVSS v2.0 Breakdown
Access Vector
NetworkAccess Complexity
LowAuthentication
NoneConfidentiality
PartialIntegrity
PartialAvailability
PartialAV:N/AC:L/Au:N/C:P/I:P/A:P
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Openssl | Openssl | 0.9.1c | All | All | All |
| Application | Openssl | Openssl | 0.9.2b | All | All | All |
| Application | Openssl | Openssl | 0.9.3 | All | All | All |
| Application | Openssl | Openssl | 0.9.3a | All | All | All |
| Application | Openssl | Openssl | 0.9.4 | All | All | All |
| Application | Openssl | Openssl | 0.9.5 | All | All | All |
| Application | Openssl | Openssl | 0.9.5 | beta1 | All | All |
| Application | Openssl | Openssl | 0.9.5 | beta2 | All | All |
| Application | Openssl | Openssl | 0.9.5a | All | All | All |
| Application | Openssl | Openssl | 0.9.5a | beta1 | All | All |
| Application | Openssl | Openssl | 0.9.5a | beta2 | All | All |
| Application | Openssl | Openssl | 0.9.6 | All | All | All |
| Application | Openssl | Openssl | 0.9.6 | beta1 | All | All |
| Application | Openssl | Openssl | 0.9.6 | beta2 | All | All |
| Application | Openssl | Openssl | 0.9.6 | beta3 | All | All |
| Application | Openssl | Openssl | 0.9.6a | All | All | All |
| Application | Openssl | Openssl | 0.9.6a | beta1 | All | All |
| Application | Openssl | Openssl | 0.9.6a | beta2 | All | All |
| Application | Openssl | Openssl | 0.9.6a | beta3 | All | All |
| Application | Openssl | Openssl | 0.9.6b | All | All | All |
| Application | Openssl | Openssl | 0.9.6c | All | All | All |
| Application | Openssl | Openssl | 0.9.6d | All | All | All |
| Application | Openssl | Openssl | 0.9.6e | All | All | All |
| Application | Openssl | Openssl | 0.9.6f | All | All | All |
| Application | Openssl | Openssl | 0.9.6g | All | All | All |
| Application | Openssl | Openssl | 0.9.6h | All | All | All |
| Application | Openssl | Openssl | 0.9.6i | All | All | All |
| Application | Openssl | Openssl | 0.9.6j | All | All | All |
| Application | Openssl | Openssl | 0.9.6k | All | All | All |
| Application | Openssl | Openssl | 0.9.6l | All | All | All |
| Application | Openssl | Openssl | 0.9.6m | All | All | All |
| Application | Openssl | Openssl | 0.9.7 | All | All | All |
| Application | Openssl | Openssl | 0.9.7 | beta1 | All | All |
| Application | Openssl | Openssl | 0.9.7 | beta2 | All | All |
| Application | Openssl | Openssl | 0.9.7 | beta3 | All | All |
| Application | Openssl | Openssl | 0.9.7 | beta4 | All | All |
| Application | Openssl | Openssl | 0.9.7 | beta5 | All | All |
| Application | Openssl | Openssl | 0.9.7 | beta6 | All | All |
| Application | Openssl | Openssl | 0.9.7a | All | All | All |
| Application | Openssl | Openssl | 0.9.7b | All | All | All |
| Application | Openssl | Openssl | 0.9.7c | All | All | All |
| Application | Openssl | Openssl | 0.9.7d | All | All | All |
| Application | Openssl | Openssl | 0.9.7e | All | All | All |
| Application | Openssl | Openssl | 0.9.7f | All | All | All |
| Application | Openssl | Openssl | 0.9.7g | All | All | All |
| Application | Openssl | Openssl | 0.9.7h | All | All | All |
| Application | Openssl | Openssl | 0.9.7i | All | All | All |
| Application | Openssl | Openssl | 0.9.7j | All | All | All |
| Application | Openssl | Openssl | 0.9.7k | All | All | All |
| Application | Openssl | Openssl | 0.9.7l | All | All | All |
| Application | Openssl | Openssl | 0.9.7m | All | All | All |
| Application | Openssl | Openssl | 0.9.8 | All | All | All |
| Application | Openssl | Openssl | 0.9.8a | All | All | All |
| Application | Openssl | Openssl | 0.9.8b | All | All | All |
| Application | Openssl | Openssl | 0.9.8c | All | All | All |
| Application | Openssl | Openssl | 0.9.8d | All | All | All |
| Application | Openssl | Openssl | 0.9.8e | All | All | All |
| Application | Openssl | Openssl | 0.9.8f | All | All | All |
| Application | Openssl | Openssl | 0.9.8g | All | All | All |
| Application | Openssl | Openssl | 0.9.8h | All | All | All |
| Application | Openssl | Openssl | 0.9.8i | All | All | All |
| Application | Openssl | Openssl | 0.9.8j | All | All | All |
| Application | Openssl | Openssl | 0.9.8k | All | All | All |
| Application | Openssl | Openssl | 0.9.8l | All | All | All |
| Application | Openssl | Openssl | 0.9.8m | All | All | All |
| Application | Openssl | Openssl | 0.9.8m | beta1 | All | All |
| Application | Openssl | Openssl | 0.9.8n | All | All | All |
| Application | Openssl | Openssl | 0.9.8o | All | All | All |
| Application | Openssl | Openssl | 0.9.8p | All | All | All |
| Application | Openssl | Openssl | 0.9.8q | All | All | All |
| Application | Openssl | Openssl | 0.9.8r | All | All | All |
| Application | Openssl | Openssl | 0.9.8s | All | All | All |
| Application | Openssl | Openssl | 0.9.8t | All | All | All |
| Application | Openssl | Openssl | 1.0.0 | All | All | All |
| Application | Openssl | Openssl | 1.0.0 | beta1 | All | All |
| Application | Openssl | Openssl | 1.0.0 | beta2 | All | All |
| Application | Openssl | Openssl | 1.0.0 | beta3 | All | All |
| Application | Openssl | Openssl | 1.0.0 | beta4 | All | All |
| Application | Openssl | Openssl | 1.0.0 | beta5 | All | All |
| Application | Openssl | Openssl | 1.0.0a | All | All | All |
| Application | Openssl | Openssl | 1.0.0b | All | All | All |
| Application | Openssl | Openssl | 1.0.0c | All | All | All |
| Application | Openssl | Openssl | 1.0.0d | All | All | All |
| Application | Openssl | Openssl | 1.0.0e | All | All | All |
| Application | Openssl | Openssl | 1.0.0g | All | All | All |
| Application | Openssl | Openssl | 1.0.1 | beta1 | All | All |
| Application | Openssl | Openssl | 1.0.1 | beta2 | All | All |
| Application | Openssl | Openssl | All | All | All | All |
| Application | Redhat | Openssl | 0.9.6-15 | All | All | All |
| Application | Redhat | Openssl | 0.9.6b-3 | All | All | All |
| Application | Redhat | Openssl | 0.9.7a-2 | All | All | All |
Vendor Declared Affected Products
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| [security-announce] SUSE-SU-2012:0637-1: important: Security update for | af854a3a-2127-422b-91ae-364da2661108 | lists.opensuse.org | |
| Red Hat Customer Portal | af854a3a-2127-422b-91ae-364da2661108 | rhn.redhat.com | |
| www.openssl.org/news/secadv_20120419.txt | af854a3a-2127-422b-91ae-364da2661108 | www.openssl.org | Vendor Advisory |
| Security Alerts - Secunia | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | |
| '[security bulletin] HPSBUX02782 SSRT100844 rev.1 - HP-UX Running OpenSSL, Remote Denial of' - MARC | af854a3a-2127-422b-91ae-364da2661108 | marc.info | |
| Red Hat Customer Portal | af854a3a-2127-422b-91ae-364da2661108 | rhn.redhat.com | |
| About the security content of OS X Mountain Lion v10.8.4 and Security Update 2013-002 | af854a3a-2127-422b-91ae-364da2661108 | support.apple.com | |
| USN-1424-1: OpenSSL vulnerabilities | Ubuntu | af854a3a-2127-422b-91ae-364da2661108 | www.ubuntu.com | |
| [security-announce] SUSE-SU-2012:1149-1: important: Security update for | af854a3a-2127-422b-91ae-364da2661108 | lists.opensuse.org | |
| About Secunia Research | Flexera | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | |
| Security Advisory SA48899 - Ubuntu update for openssl - Secunia | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | |
| Security Advisory SA48942 - Red Hat update for openssl - Secunia | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | |
| cvs.openssl.org/chngview | af854a3a-2127-422b-91ae-364da2661108 | cvs.openssl.org | |
| [SECURITY] Fedora 18 Update: mingw-openssl-1.0.1c-1.fc18 | af854a3a-2127-422b-91ae-364da2661108 | lists.fedoraproject.org | |
| Security Advisory SA57353 - IBM Storage System DS8870 OpenSSL Multiple Vulnerabilities - Secunia | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | |
| [SECURITY] Fedora 17 Update: openssl-1.0.0i-1.fc17 | af854a3a-2127-422b-91ae-364da2661108 | lists.fedoraproject.org | |
| IBM Security Bulletin: Storage HMC OpenSSL upgrade to address cryptographic vulnerabilities. - United States | af854a3a-2127-422b-91ae-364da2661108 | www-01.ibm.com | |
| '[security bulletin] HPSBMU02776 SSRT100852 rev.1 - HP Onboard Administrator (OA), Remote Unauthorize' - MARC | af854a3a-2127-422b-91ae-364da2661108 | marc.info | |
| cvs.openssl.org/chngview | af854a3a-2127-422b-91ae-364da2661108 | cvs.openssl.org | |
| APPLE-SA-2013-06-04-1 OS X Mountain Lion v10.8.4 and Security Update 2013-002 | af854a3a-2127-422b-91ae-364da2661108 | lists.apple.com | |
| cvs.openssl.org/chngview | af854a3a-2127-422b-91ae-364da2661108 | cvs.openssl.org | |
| [SECURITY] Fedora 16 Update: openssl-1.0.0i-1.fc16 | af854a3a-2127-422b-91ae-364da2661108 | lists.fedoraproject.org | |
| OpenSSL ASN1 BIO Memory Corruption Vulnerability | af854a3a-2127-422b-91ae-364da2661108 | www.exploit-db.com | |
| 2013-05 Security Bulletin: Steel Belted Radius: OpenSSL vulnerability CVE-2012-2110 - Juniper Networks | af854a3a-2127-422b-91ae-364da2661108 | kb.juniper.net | |
| OpenSSL asn1_d2i_read_bio() Buffer Overflow Lets Remote Users Execute Arbitrary Code - SecurityTracker | af854a3a-2127-422b-91ae-364da2661108 | www.securitytracker.com | |
| mandriva.com | af854a3a-2127-422b-91ae-364da2661108 | www.mandriva.com | |
| osvdb.org/81223 | af854a3a-2127-422b-91ae-364da2661108 | osvdb.org | |
| Security Alerts - Secunia | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | |
| [security-announce] SUSE-SU-2012:0623-1: important: Security update for | af854a3a-2127-422b-91ae-364da2661108 | lists.opensuse.org | |
| Red Hat Customer Portal | af854a3a-2127-422b-91ae-364da2661108 | rhn.redhat.com | |
| Red Hat Customer Portal | af854a3a-2127-422b-91ae-364da2661108 | rhn.redhat.com | |
| OpenSSL Encoded ASN.1 Data Integer Truncation Memory Corruption Vulnerability | af854a3a-2127-422b-91ae-364da2661108 | www.securityfocus.com | |
| Red Hat Customer Portal | af854a3a-2127-422b-91ae-364da2661108 | rhn.redhat.com | |
| '[security bulletin] HPSBOV02793 SSRT100891 rev.1 - HP OpenVMS running SSL, Remote Denial of Service' - MARC | af854a3a-2127-422b-91ae-364da2661108 | marc.info | |
| Collax | af854a3a-2127-422b-91ae-364da2661108 | www.collax.com | |
| h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay | af854a3a-2127-422b-91ae-364da2661108 | h20564.www2.hp.com | |
| [SECURITY] Fedora 15 Update: openssl-1.0.0i-1.fc15 | af854a3a-2127-422b-91ae-364da2661108 | lists.fedoraproject.org | |
| NEOHAPSIS - Peace of Mind Through Integrity and Insight | af854a3a-2127-422b-91ae-364da2661108 | archives.neohapsis.com | Exploit |
| Debian -- Security Information -- DSA-2454-2 openssl | af854a3a-2127-422b-91ae-364da2661108 | www.debian.org | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 390226 Oracle Managed Virtualization (VM) Server for x86 Security Update for Open Secure Sockets Layer (OpenSSL) (OVMSA-2021-0011)
- 390284 Oracle Managed Virtualization (VM) Server for x86 Security Update for Open Secure Sockets Layer (OpenSSL) (OVMSA-2023-0013)
- 591311 Bosch Rexroth PRA-ES8P2S Ethernet-Switch Multiple Vulnerabilities (BOSCH-SA-247053-BT)
- 591350 General Electric D20MX Open Secure Sockets Layer (OpenSSL) Multiple Vulnerabilities (PRSN-0006)