Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-3735

Опубликовано: 28 авг. 2017
Источник: debian
EPSS Низкий

Описание

While parsing an IPAddressFamily extension in an X.509 certificate, it is possible to do a one-byte overread. This would result in an incorrect text display of the certificate. This bug has been present since 2006 and is present in all versions of OpenSSL before 1.0.2m and 1.1.0g.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
opensslfixed1.1.0g-1package
openssl1.0fixed1.0.2m-1package

Примечания

  • Fix for 1.0.2: https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=31c8b265591a0aaa462a1f3eb5770661aaac67db

  • Fix for 1.1.0: https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=068b963bb7afc57f5bdd723de0dd15e7795d5822

EPSS

Процентиль: 92%
0.07994
Низкий

Связанные уязвимости

CVSS3: 5.3
ubuntu
больше 8 лет назад

While parsing an IPAddressFamily extension in an X.509 certificate, it is possible to do a one-byte overread. This would result in an incorrect text display of the certificate. This bug has been present since 2006 and is present in all versions of OpenSSL before 1.0.2m and 1.1.0g.

CVSS3: 5.3
redhat
больше 8 лет назад

While parsing an IPAddressFamily extension in an X.509 certificate, it is possible to do a one-byte overread. This would result in an incorrect text display of the certificate. This bug has been present since 2006 and is present in all versions of OpenSSL before 1.0.2m and 1.1.0g.

CVSS3: 5.3
nvd
больше 8 лет назад

While parsing an IPAddressFamily extension in an X.509 certificate, it is possible to do a one-byte overread. This would result in an incorrect text display of the certificate. This bug has been present since 2006 and is present in all versions of OpenSSL before 1.0.2m and 1.1.0g.

suse-cvrf
около 8 лет назад

Security update for openssl

suse-cvrf
около 8 лет назад

Security update for openssl1

EPSS

Процентиль: 92%
0.07994
Низкий