Логотип exploitDog
bind:"CVE-2017-3731"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2017-3731"

Количество 20

Количество 20

ubuntu логотип

CVE-2017-3731

около 8 лет назад

If an SSL/TLS server or client is running on a 32-bit host, and a specific cipher is being used, then a truncated packet can cause that server or client to perform an out-of-bounds read, usually resulting in a crash. For OpenSSL 1.1.0, the crash can be triggered when using CHACHA20/POLY1305; users should upgrade to 1.1.0d. For Openssl 1.0.2, the crash can be triggered when using RC4-MD5; users who have not disabled that algorithm should update to 1.0.2k.

CVSS3: 7.5
EPSS: Средний
redhat логотип

CVE-2017-3731

больше 8 лет назад

If an SSL/TLS server or client is running on a 32-bit host, and a specific cipher is being used, then a truncated packet can cause that server or client to perform an out-of-bounds read, usually resulting in a crash. For OpenSSL 1.1.0, the crash can be triggered when using CHACHA20/POLY1305; users should upgrade to 1.1.0d. For Openssl 1.0.2, the crash can be triggered when using RC4-MD5; users who have not disabled that algorithm should update to 1.0.2k.

CVSS3: 5.9
EPSS: Средний
nvd логотип

CVE-2017-3731

около 8 лет назад

If an SSL/TLS server or client is running on a 32-bit host, and a specific cipher is being used, then a truncated packet can cause that server or client to perform an out-of-bounds read, usually resulting in a crash. For OpenSSL 1.1.0, the crash can be triggered when using CHACHA20/POLY1305; users should upgrade to 1.1.0d. For Openssl 1.0.2, the crash can be triggered when using RC4-MD5; users who have not disabled that algorithm should update to 1.0.2k.

CVSS3: 7.5
EPSS: Средний
debian логотип

CVE-2017-3731

около 8 лет назад

If an SSL/TLS server or client is running on a 32-bit host, and a spec ...

CVSS3: 7.5
EPSS: Средний
github логотип

GHSA-3cp9-4w64-73cg

около 3 лет назад

If an SSL/TLS server or client is running on a 32-bit host, and a specific cipher is being used, then a truncated packet can cause that server or client to perform an out-of-bounds read, usually resulting in a crash. For OpenSSL 1.1.0, the crash can be triggered when using CHACHA20/POLY1305; users should upgrade to 1.1.0d. For Openssl 1.0.2, the crash can be triggered when using RC4-MD5; users who have not disabled that algorithm should update to 1.0.2k.

CVSS3: 7.5
EPSS: Средний
fstec логотип

BDU:2020-02909

около 8 лет назад

Уязвимость библиотеки OpenSSL, связанная с чтением за границами буфера в памяти, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
EPSS: Средний
oracle-oval логотип

ELSA-2017-0286

больше 8 лет назад

ELSA-2017-0286: openssl security update (MODERATE)

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2017:0941-1

около 8 лет назад

Security update for nodejs4

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2017:0527-1

больше 8 лет назад

Security update for nodejs

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2017:0481-1

больше 8 лет назад

Security update for openssl

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2017:0855-1

около 8 лет назад

Security update for nodejs4

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2017:0441-1

больше 8 лет назад

Security update for openssl

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2017:0431-1

больше 8 лет назад

Security update for nodejs6

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2017:0487-1

больше 8 лет назад

Security update for openssl

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2017:0495-1

больше 8 лет назад

Security update for openssl1

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2017:0461-1

больше 8 лет назад

Security update for openssl

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2018:0112-1

больше 7 лет назад

Security update for openssl

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2017:2868-1

больше 7 лет назад

Security update for mysql-community-server

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2018:0458-1

больше 7 лет назад

Security update for openssl-steam

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2017:2700-1

больше 7 лет назад

Security update for SLES 12-SP1 Docker image

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2017-3731

If an SSL/TLS server or client is running on a 32-bit host, and a specific cipher is being used, then a truncated packet can cause that server or client to perform an out-of-bounds read, usually resulting in a crash. For OpenSSL 1.1.0, the crash can be triggered when using CHACHA20/POLY1305; users should upgrade to 1.1.0d. For Openssl 1.0.2, the crash can be triggered when using RC4-MD5; users who have not disabled that algorithm should update to 1.0.2k.

CVSS3: 7.5
15%
Средний
около 8 лет назад
redhat логотип
CVE-2017-3731

If an SSL/TLS server or client is running on a 32-bit host, and a specific cipher is being used, then a truncated packet can cause that server or client to perform an out-of-bounds read, usually resulting in a crash. For OpenSSL 1.1.0, the crash can be triggered when using CHACHA20/POLY1305; users should upgrade to 1.1.0d. For Openssl 1.0.2, the crash can be triggered when using RC4-MD5; users who have not disabled that algorithm should update to 1.0.2k.

CVSS3: 5.9
15%
Средний
больше 8 лет назад
nvd логотип
CVE-2017-3731

If an SSL/TLS server or client is running on a 32-bit host, and a specific cipher is being used, then a truncated packet can cause that server or client to perform an out-of-bounds read, usually resulting in a crash. For OpenSSL 1.1.0, the crash can be triggered when using CHACHA20/POLY1305; users should upgrade to 1.1.0d. For Openssl 1.0.2, the crash can be triggered when using RC4-MD5; users who have not disabled that algorithm should update to 1.0.2k.

CVSS3: 7.5
15%
Средний
около 8 лет назад
debian логотип
CVE-2017-3731

If an SSL/TLS server or client is running on a 32-bit host, and a spec ...

CVSS3: 7.5
15%
Средний
около 8 лет назад
github логотип
GHSA-3cp9-4w64-73cg

If an SSL/TLS server or client is running on a 32-bit host, and a specific cipher is being used, then a truncated packet can cause that server or client to perform an out-of-bounds read, usually resulting in a crash. For OpenSSL 1.1.0, the crash can be triggered when using CHACHA20/POLY1305; users should upgrade to 1.1.0d. For Openssl 1.0.2, the crash can be triggered when using RC4-MD5; users who have not disabled that algorithm should update to 1.0.2k.

CVSS3: 7.5
15%
Средний
около 3 лет назад
fstec логотип
BDU:2020-02909

Уязвимость библиотеки OpenSSL, связанная с чтением за границами буфера в памяти, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
15%
Средний
около 8 лет назад
oracle-oval логотип
ELSA-2017-0286

ELSA-2017-0286: openssl security update (MODERATE)

больше 8 лет назад
suse-cvrf логотип
openSUSE-SU-2017:0941-1

Security update for nodejs4

около 8 лет назад
suse-cvrf логотип
openSUSE-SU-2017:0527-1

Security update for nodejs

больше 8 лет назад
suse-cvrf логотип
openSUSE-SU-2017:0481-1

Security update for openssl

больше 8 лет назад
suse-cvrf логотип
SUSE-SU-2017:0855-1

Security update for nodejs4

около 8 лет назад
suse-cvrf логотип
SUSE-SU-2017:0441-1

Security update for openssl

больше 8 лет назад
suse-cvrf логотип
SUSE-SU-2017:0431-1

Security update for nodejs6

больше 8 лет назад
suse-cvrf логотип
openSUSE-SU-2017:0487-1

Security update for openssl

больше 8 лет назад
suse-cvrf логотип
SUSE-SU-2017:0495-1

Security update for openssl1

больше 8 лет назад
suse-cvrf логотип
SUSE-SU-2017:0461-1

Security update for openssl

больше 8 лет назад
suse-cvrf логотип
SUSE-SU-2018:0112-1

Security update for openssl

больше 7 лет назад
suse-cvrf логотип
openSUSE-SU-2017:2868-1

Security update for mysql-community-server

больше 7 лет назад
suse-cvrf логотип
openSUSE-SU-2018:0458-1

Security update for openssl-steam

больше 7 лет назад
suse-cvrf логотип
SUSE-SU-2017:2700-1

Security update for SLES 12-SP1 Docker image

больше 7 лет назад

Уязвимостей на страницу