Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2024-6119

Опубликовано: 03 сент. 2024
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS3: 7.5

Описание

Issue summary: Applications performing certificate name checks (e.g., TLS clients checking server certificates) may attempt to read an invalid memory address resulting in abnormal termination of the application process. Impact summary: Abnormal termination of an application can a cause a denial of service. Applications performing certificate name checks (e.g., TLS clients checking server certificates) may attempt to read an invalid memory address when comparing the expected name with an otherName subject alternative name of an X.509 certificate. This may result in an exception that terminates the application program. Note that basic certificate chain validation (signatures, dates, ...) is not affected, the denial of service can occur only when the application also specifies an expected DNS name, Email address or IP address. TLS servers rarely solicit client certificates, and even when they do, they generally don't perform a name check against a reference identifier (expected i...

РелизСтатусПримечание
devel

needs-triage

esm-apps/bionic

needs-triage

esm-apps/xenial

needs-triage

esm-infra/focal

needs-triage

focal

ignored

end of standard support, was needs-triage
jammy

needs-triage

noble

needs-triage

oracular

needs-triage

plucky

needs-triage

upstream

needs-triage

Показывать по

РелизСтатусПримечание
devel

not-affected

uses system openssl
esm-apps/bionic

needs-triage

esm-apps/focal

not-affected

uses system openssl
esm-apps/jammy

needs-triage

esm-apps/noble

not-affected

uses system openssl
esm-apps/xenial

needs-triage

esm-infra-legacy/trusty

not-affected

uses system openssl
focal

not-affected

uses system openssl
jammy

needed

noble

not-affected

uses system openssl

Показывать по

РелизСтатусПримечание
devel

released

3.3.1-2ubuntu2
esm-infra-legacy/trusty

not-affected

3.x only
esm-infra/bionic

not-affected

3.x only
esm-infra/focal

not-affected

3.x only
esm-infra/xenial

not-affected

3.x only
fips-preview/jammy

needed

fips-updates/bionic

not-affected

3.x only
fips-updates/focal

not-affected

3.x only
fips-updates/jammy

released

3.0.2-0ubuntu1.18+Fips1
fips-updates/xenial

not-affected

3.x only

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra/bionic

not-affected

3.x only
esm-infra/focal

DNE

focal

DNE

jammy

DNE

noble

DNE

oracular

DNE

plucky

DNE

upstream

needs-triage

Показывать по

EPSS

Процентиль: 69%
0.00611
Низкий

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 5.9
redhat
10 месяцев назад

Issue summary: Applications performing certificate name checks (e.g., TLS clients checking server certificates) may attempt to read an invalid memory address resulting in abnormal termination of the application process. Impact summary: Abnormal termination of an application can a cause a denial of service. Applications performing certificate name checks (e.g., TLS clients checking server certificates) may attempt to read an invalid memory address when comparing the expected name with an `otherName` subject alternative name of an X.509 certificate. This may result in an exception that terminates the application program. Note that basic certificate chain validation (signatures, dates, ...) is not affected, the denial of service can occur only when the application also specifies an expected DNS name, Email address or IP address. TLS servers rarely solicit client certificates, and even when they do, they generally don't perform a name check against a reference identifier (expected ident...

CVSS3: 7.5
nvd
10 месяцев назад

Issue summary: Applications performing certificate name checks (e.g., TLS clients checking server certificates) may attempt to read an invalid memory address resulting in abnormal termination of the application process. Impact summary: Abnormal termination of an application can a cause a denial of service. Applications performing certificate name checks (e.g., TLS clients checking server certificates) may attempt to read an invalid memory address when comparing the expected name with an `otherName` subject alternative name of an X.509 certificate. This may result in an exception that terminates the application program. Note that basic certificate chain validation (signatures, dates, ...) is not affected, the denial of service can occur only when the application also specifies an expected DNS name, Email address or IP address. TLS servers rarely solicit client certificates, and even when they do, they generally don't perform a name check against a reference identifier (expected iden

CVSS3: 7.5
msrc
8 месяцев назад

Описание отсутствует

CVSS3: 7.5
debian
10 месяцев назад

Issue summary: Applications performing certificate name checks (e.g., ...

suse-cvrf
около 1 месяца назад

Security update for openssl-3

EPSS

Процентиль: 69%
0.00611
Низкий

7.5 High

CVSS3

Уязвимость CVE-2024-6119