Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-3735

Опубликовано: 28 авг. 2017
Источник: debian
EPSS Средний

Описание

While parsing an IPAddressFamily extension in an X.509 certificate, it is possible to do a one-byte overread. This would result in an incorrect text display of the certificate. This bug has been present since 2006 and is present in all versions of OpenSSL before 1.0.2m and 1.1.0g.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
opensslfixed1.1.0g-1package
openssl1.0fixed1.0.2m-1package

Примечания

  • Fix for 1.0.2: https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=31c8b265591a0aaa462a1f3eb5770661aaac67db

  • Fix for 1.1.0: https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=068b963bb7afc57f5bdd723de0dd15e7795d5822

EPSS

Процентиль: 97%
0.37446
Средний

Связанные уязвимости

CVSS3: 5.3
ubuntu
почти 8 лет назад

While parsing an IPAddressFamily extension in an X.509 certificate, it is possible to do a one-byte overread. This would result in an incorrect text display of the certificate. This bug has been present since 2006 and is present in all versions of OpenSSL before 1.0.2m and 1.1.0g.

CVSS3: 5.3
redhat
почти 8 лет назад

While parsing an IPAddressFamily extension in an X.509 certificate, it is possible to do a one-byte overread. This would result in an incorrect text display of the certificate. This bug has been present since 2006 and is present in all versions of OpenSSL before 1.0.2m and 1.1.0g.

CVSS3: 5.3
nvd
почти 8 лет назад

While parsing an IPAddressFamily extension in an X.509 certificate, it is possible to do a one-byte overread. This would result in an incorrect text display of the certificate. This bug has been present since 2006 and is present in all versions of OpenSSL before 1.0.2m and 1.1.0g.

suse-cvrf
больше 7 лет назад

Security update for openssl

suse-cvrf
больше 7 лет назад

Security update for openssl1

EPSS

Процентиль: 97%
0.37446
Средний