Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2021-3712

Опубликовано: 24 авг. 2021
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 5.8
CVSS3: 7.4

Описание

ASN.1 strings are represented internally within OpenSSL as an ASN1_STRING structure which contains a buffer holding the string data and a field holding the buffer length. This contrasts with normal C strings which are repesented as a buffer for the string data which is terminated with a NUL (0) byte. Although not a strict requirement, ASN.1 strings that are parsed using OpenSSL's own "d2i" functions (and other similar parsing functions) as well as any string whose value has been set with the ASN1_STRING_set() function will additionally NUL terminate the byte array in the ASN1_STRING structure. However, it is possible for applications to directly construct valid ASN1_STRING structures which do not NUL terminate the byte array by directly setting the "data" and "length" fields in the ASN1_STRING array. This can also happen by using the ASN1_STRING_set0() function. Numerous OpenSSL functions that print ASN.1 data have been found to assume that the ASN1_STRING byte array will be NUL ter...

РелизСтатусПримечание
bionic

ignored

end of standard support, was needs-triage
devel

not-affected

2022.11-2
esm-apps/bionic

needs-triage

esm-apps/xenial

needs-triage

esm-infra-legacy/trusty

DNE

esm-infra/focal

not-affected

0~20191122.bd85bf54-2ubuntu3.3
focal

released

0~20191122.bd85bf54-2ubuntu3.3
hirsute

released

2020.11-4ubuntu0.1
impish

ignored

end of life
jammy

needs-triage

Показывать по

РелизСтатусПримечание
bionic

not-affected

uses system openssl1.0
devel

not-affected

uses system openssl1.1
esm-apps/bionic

not-affected

uses system openssl1.0
esm-apps/focal

not-affected

uses system openssl1.1
esm-apps/jammy

not-affected

12.22.9~dfsg-1ubuntu3
esm-apps/noble

not-affected

uses system openssl1.1
esm-apps/xenial

not-affected

uses system openssl
esm-infra-legacy/trusty

not-affected

uses system openssl
focal

not-affected

uses system openssl1.1
hirsute

not-affected

uses system openssl1.1

Показывать по

РелизСтатусПримечание
bionic

released

1.1.1-1ubuntu2.1~18.04.13
devel

released

1.1.1l-1ubuntu1
esm-infra-legacy/trusty

not-affected

1.0.1f-1ubuntu2.27+esm4
esm-infra/bionic

not-affected

1.1.1-1ubuntu2.1~18.04.13
esm-infra/focal

not-affected

1.1.1f-1ubuntu2.8
esm-infra/xenial

released

1.0.2g-1ubuntu4.20+esm1
fips-preview/jammy

released

1.1.1l-1ubuntu1
fips-updates/bionic

released

1.1.1-1ubuntu2.fips.2.1~18.04.13.2
fips-updates/focal

released

1.1.1f-1ubuntu2.fips.7.2
fips-updates/jammy

released

1.1.1l-1ubuntu1

Показывать по

РелизСтатусПримечание
bionic

released

1.0.2n-1ubuntu5.7
devel

DNE

esm-infra-legacy/trusty

DNE

esm-infra/bionic

not-affected

1.0.2n-1ubuntu5.7
esm-infra/focal

DNE

focal

DNE

hirsute

DNE

impish

DNE

jammy

DNE

kinetic

DNE

Показывать по

EPSS

Процентиль: 73%
0.00814
Низкий

5.8 Medium

CVSS2

7.4 High

CVSS3

Связанные уязвимости

CVSS3: 7.4
redhat
почти 4 года назад

ASN.1 strings are represented internally within OpenSSL as an ASN1_STRING structure which contains a buffer holding the string data and a field holding the buffer length. This contrasts with normal C strings which are repesented as a buffer for the string data which is terminated with a NUL (0) byte. Although not a strict requirement, ASN.1 strings that are parsed using OpenSSL's own "d2i" functions (and other similar parsing functions) as well as any string whose value has been set with the ASN1_STRING_set() function will additionally NUL terminate the byte array in the ASN1_STRING structure. However, it is possible for applications to directly construct valid ASN1_STRING structures which do not NUL terminate the byte array by directly setting the "data" and "length" fields in the ASN1_STRING array. This can also happen by using the ASN1_STRING_set0() function. Numerous OpenSSL functions that print ASN.1 data have been found to assume that the ASN1_STRING byte array will be NUL ter...

CVSS3: 7.4
nvd
почти 4 года назад

ASN.1 strings are represented internally within OpenSSL as an ASN1_STRING structure which contains a buffer holding the string data and a field holding the buffer length. This contrasts with normal C strings which are repesented as a buffer for the string data which is terminated with a NUL (0) byte. Although not a strict requirement, ASN.1 strings that are parsed using OpenSSL's own "d2i" functions (and other similar parsing functions) as well as any string whose value has been set with the ASN1_STRING_set() function will additionally NUL terminate the byte array in the ASN1_STRING structure. However, it is possible for applications to directly construct valid ASN1_STRING structures which do not NUL terminate the byte array by directly setting the "data" and "length" fields in the ASN1_STRING array. This can also happen by using the ASN1_STRING_set0() function. Numerous OpenSSL functions that print ASN.1 data have been found to assume that the ASN1_STRING byte array will be NUL termin

CVSS3: 7.4
msrc
больше 3 лет назад

Описание отсутствует

CVSS3: 7.4
debian
почти 4 года назад

ASN.1 strings are represented internally within OpenSSL as an ASN1_STR ...

suse-cvrf
почти 4 года назад

Security update for openssl-1_0_0

EPSS

Процентиль: 73%
0.00814
Низкий

5.8 Medium

CVSS2

7.4 High

CVSS3

Уязвимость CVE-2021-3712