The asn1_d2i_read_bio function in crypto/asn1/a_d2i_fp.c in OpenSSL before 0.9.8v, 1.0.0 before 1.0.0i, and 1.0.1 before 1.0.1a does not properly interpret integer data, which allows remote attackers to conduct buffer overflow attacks, and cause a denial of service (memory corruption) or possibly have unspecified other impact, via crafted DER data, as demonstrated by an X.509 certificate or an RSA public key.
Advisories
Source ID Title
Debian DSA Debian DSA DSA-2454-1 openssl security update
Debian DSA Debian DSA DSA-2454-2 openssl incomplete fix
EUVD EUVD EUVD-2012-2113 The asn1_d2i_read_bio function in crypto/asn1/a_d2i_fp.c in OpenSSL before 0.9.8v, 1.0.0 before 1.0.0i, and 1.0.1 before 1.0.1a does not properly interpret integer data, which allows remote attackers to conduct buffer overflow attacks, and cause a denial of service (memory corruption) or possibly have unspecified other impact, via crafted DER data, as demonstrated by an X.509 certificate or an RSA public key.
Ubuntu USN Ubuntu USN USN-1424-1 OpenSSL vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

References
Link Providers
http://archives.neohapsis.com/archives/fulldisclosure/2012-04/0209.html cve-icon cve-icon
http://cvs.openssl.org/chngview?cn=22431 cve-icon cve-icon
http://cvs.openssl.org/chngview?cn=22434 cve-icon cve-icon
http://cvs.openssl.org/chngview?cn=22439 cve-icon cve-icon
http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html cve-icon cve-icon
http://lists.fedoraproject.org/pipermail/package-announce/2012-April/079149.html cve-icon cve-icon
http://lists.fedoraproject.org/pipermail/package-announce/2012-April/079299.html cve-icon cve-icon
http://lists.fedoraproject.org/pipermail/package-announce/2012-May/080176.html cve-icon cve-icon
http://lists.fedoraproject.org/pipermail/package-announce/2012-November/092905.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00014.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00015.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00007.html cve-icon cve-icon
http://marc.info/?l=bugtraq&m=133728068926468&w=2 cve-icon cve-icon
http://marc.info/?l=bugtraq&m=133951357207000&w=2 cve-icon cve-icon
http://marc.info/?l=bugtraq&m=134039053214295&w=2 cve-icon cve-icon
http://osvdb.org/81223 cve-icon cve-icon
http://rhn.redhat.com/errata/RHSA-2012-0518.html cve-icon cve-icon
http://rhn.redhat.com/errata/RHSA-2012-0522.html cve-icon cve-icon
http://rhn.redhat.com/errata/RHSA-2012-1306.html cve-icon cve-icon
http://rhn.redhat.com/errata/RHSA-2012-1307.html cve-icon cve-icon
http://rhn.redhat.com/errata/RHSA-2012-1308.html cve-icon cve-icon
http://secunia.com/advisories/48847 cve-icon cve-icon
http://secunia.com/advisories/48895 cve-icon cve-icon
http://secunia.com/advisories/48899 cve-icon cve-icon
http://secunia.com/advisories/48942 cve-icon cve-icon
http://secunia.com/advisories/48999 cve-icon cve-icon
http://secunia.com/advisories/57353 cve-icon cve-icon
http://support.apple.com/kb/HT5784 cve-icon cve-icon
http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004564 cve-icon cve-icon
http://www.collax.com/produkte/AllinOne-server-for-small-businesses#id2565578 cve-icon cve-icon
http://www.debian.org/security/2012/dsa-2454 cve-icon cve-icon
http://www.exploit-db.com/exploits/18756 cve-icon cve-icon
http://www.mandriva.com/security/advisories?name=MDVSA-2012:060 cve-icon cve-icon
http://www.openssl.org/news/secadv_20120419.txt cve-icon cve-icon cve-icon
http://www.securityfocus.com/bid/53158 cve-icon cve-icon
http://www.securitytracker.com/id?1026957 cve-icon cve-icon
http://www.ubuntu.com/usn/USN-1424-1 cve-icon cve-icon
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862 cve-icon cve-icon
https://kb.juniper.net/KB27376 cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2012-2110 cve-icon
https://www.cve.org/CVERecord?id=CVE-2012-2110 cve-icon
History

Sun, 13 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.06197}

epss

{'score': 0.06281}


cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2024-08-06T19:26:07.655Z

Reserved: 2012-04-04T00:00:00

Link: CVE-2012-2110

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2012-04-19T17:55:01.253

Modified: 2025-04-11T00:51:21.963

Link: CVE-2012-2110

cve-icon Redhat

Severity : Important

Publid Date: 2012-04-19T00:00:00Z

Links: CVE-2012-2110 - Bugzilla

cve-icon OpenCVE Enrichment

No data.