Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2017-3731

Опубликовано: 04 мая 2017
Источник: ubuntu
Приоритет: medium
EPSS Средний
CVSS2: 5
CVSS3: 7.5

Описание

If an SSL/TLS server or client is running on a 32-bit host, and a specific cipher is being used, then a truncated packet can cause that server or client to perform an out-of-bounds read, usually resulting in a crash. For OpenSSL 1.1.0, the crash can be triggered when using CHACHA20/POLY1305; users should upgrade to 1.1.0d. For Openssl 1.0.2, the crash can be triggered when using RC4-MD5; users who have not disabled that algorithm should update to 1.0.2k.

РелизСтатусПримечание
artful

released

1.0.2g-1ubuntu11
bionic

released

1.0.2g-1ubuntu11
cosmic

released

1.0.2g-1ubuntu11
devel

released

1.0.2g-1ubuntu11
disco

released

1.0.2g-1ubuntu11
esm-infra-legacy/trusty

not-affected

1.0.1f-1ubuntu2.22
esm-infra/bionic

not-affected

1.0.2g-1ubuntu11
esm-infra/xenial

not-affected

1.0.2g-1ubuntu4.6
precise

released

1.0.1-4ubuntu5.39
precise/esm

not-affected

1.0.1-4ubuntu5.39

Показывать по

РелизСтатусПримечание
artful

DNE

bionic

DNE

cosmic

DNE

devel

DNE

disco

DNE

esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was needs-triage]
precise

ignored

end of life
precise/esm

DNE

precise was needs-triage
trusty

ignored

end of standard support
trusty/esm

DNE

trusty was needs-triage

Показывать по

EPSS

Процентиль: 94%
0.14905
Средний

5 Medium

CVSS2

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 5.9
redhat
больше 8 лет назад

If an SSL/TLS server or client is running on a 32-bit host, and a specific cipher is being used, then a truncated packet can cause that server or client to perform an out-of-bounds read, usually resulting in a crash. For OpenSSL 1.1.0, the crash can be triggered when using CHACHA20/POLY1305; users should upgrade to 1.1.0d. For Openssl 1.0.2, the crash can be triggered when using RC4-MD5; users who have not disabled that algorithm should update to 1.0.2k.

CVSS3: 7.5
nvd
около 8 лет назад

If an SSL/TLS server or client is running on a 32-bit host, and a specific cipher is being used, then a truncated packet can cause that server or client to perform an out-of-bounds read, usually resulting in a crash. For OpenSSL 1.1.0, the crash can be triggered when using CHACHA20/POLY1305; users should upgrade to 1.1.0d. For Openssl 1.0.2, the crash can be triggered when using RC4-MD5; users who have not disabled that algorithm should update to 1.0.2k.

CVSS3: 7.5
debian
около 8 лет назад

If an SSL/TLS server or client is running on a 32-bit host, and a spec ...

CVSS3: 7.5
github
около 3 лет назад

If an SSL/TLS server or client is running on a 32-bit host, and a specific cipher is being used, then a truncated packet can cause that server or client to perform an out-of-bounds read, usually resulting in a crash. For OpenSSL 1.1.0, the crash can be triggered when using CHACHA20/POLY1305; users should upgrade to 1.1.0d. For Openssl 1.0.2, the crash can be triggered when using RC4-MD5; users who have not disabled that algorithm should update to 1.0.2k.

CVSS3: 7.5
fstec
около 8 лет назад

Уязвимость библиотеки OpenSSL, связанная с чтением за границами буфера в памяти, позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 94%
0.14905
Средний

5 Medium

CVSS2

7.5 High

CVSS3

Уязвимость CVE-2017-3731