Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2020-1967

Опубликовано: 21 апр. 2020
Источник: ubuntu
Приоритет: high
CVSS2: 5
CVSS3: 7.5

Описание

Server or client applications that call the SSL_check_chain() function during or after a TLS 1.3 handshake may crash due to a NULL pointer dereference as a result of incorrect handling of the "signature_algorithms_cert" TLS extension. The crash occurs if an invalid or unrecognised signature algorithm is received from the peer. This could be exploited by a malicious peer in a Denial of Service attack. OpenSSL version 1.1.1d, 1.1.1e, and 1.1.1f are affected by this issue. This issue did not affect OpenSSL versions prior to 1.1.1d. Fixed in OpenSSL 1.1.1g (Affected 1.1.1d-1.1.1f).

РелизСтатусПримечание
bionic

not-affected

code not present
devel

not-affected

code not compiled
eoan

not-affected

code not present
esm-apps/bionic

not-affected

code not present
esm-apps/xenial

not-affected

code not present
esm-infra-legacy/trusty

DNE

esm-infra/focal

not-affected

code not compiled
focal

not-affected

code not compiled
precise/esm

DNE

trusty

ignored

end of standard support

Показывать по

РелизСтатусПримечание
bionic

not-affected

code not present
devel

released

1.1.1f-1ubuntu2
eoan

not-affected

code not present
esm-infra-legacy/trusty

not-affected

code not present
esm-infra/bionic

not-affected

code not present
esm-infra/focal

released

1.1.1f-1ubuntu2
esm-infra/xenial

not-affected

code not present
focal

released

1.1.1f-1ubuntu2
precise/esm

not-affected

code not present
trusty

ignored

end of standard support

Показывать по

РелизСтатусПримечание
bionic

not-affected

code not present
devel

DNE

eoan

DNE

esm-infra-legacy/trusty

DNE

esm-infra/bionic

not-affected

code not present
esm-infra/focal

DNE

focal

DNE

precise/esm

DNE

trusty

DNE

trusty/esm

DNE

Показывать по

5 Medium

CVSS2

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
redhat
почти 6 лет назад

Server or client applications that call the SSL_check_chain() function during or after a TLS 1.3 handshake may crash due to a NULL pointer dereference as a result of incorrect handling of the "signature_algorithms_cert" TLS extension. The crash occurs if an invalid or unrecognised signature algorithm is received from the peer. This could be exploited by a malicious peer in a Denial of Service attack. OpenSSL version 1.1.1d, 1.1.1e, and 1.1.1f are affected by this issue. This issue did not affect OpenSSL versions prior to 1.1.1d. Fixed in OpenSSL 1.1.1g (Affected 1.1.1d-1.1.1f).

CVSS3: 7.5
nvd
почти 6 лет назад

Server or client applications that call the SSL_check_chain() function during or after a TLS 1.3 handshake may crash due to a NULL pointer dereference as a result of incorrect handling of the "signature_algorithms_cert" TLS extension. The crash occurs if an invalid or unrecognised signature algorithm is received from the peer. This could be exploited by a malicious peer in a Denial of Service attack. OpenSSL version 1.1.1d, 1.1.1e, and 1.1.1f are affected by this issue. This issue did not affect OpenSSL versions prior to 1.1.1d. Fixed in OpenSSL 1.1.1g (Affected 1.1.1d-1.1.1f).

CVSS3: 7.5
debian
почти 6 лет назад

Server or client applications that call the SSL_check_chain() function ...

suse-cvrf
больше 5 лет назад

Security update for rust, rust-cbindgen

suse-cvrf
больше 5 лет назад

Security update for rust, rust-cbindgen

5 Medium

CVSS2

7.5 High

CVSS3