Логотип exploitDog
bind:CVE-2020-1967
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2020-1967

Количество 11

Количество 11

ubuntu логотип

CVE-2020-1967

почти 6 лет назад

Server or client applications that call the SSL_check_chain() function during or after a TLS 1.3 handshake may crash due to a NULL pointer dereference as a result of incorrect handling of the "signature_algorithms_cert" TLS extension. The crash occurs if an invalid or unrecognised signature algorithm is received from the peer. This could be exploited by a malicious peer in a Denial of Service attack. OpenSSL version 1.1.1d, 1.1.1e, and 1.1.1f are affected by this issue. This issue did not affect OpenSSL versions prior to 1.1.1d. Fixed in OpenSSL 1.1.1g (Affected 1.1.1d-1.1.1f).

CVSS3: 7.5
EPSS: Средний
redhat логотип

CVE-2020-1967

почти 6 лет назад

Server or client applications that call the SSL_check_chain() function during or after a TLS 1.3 handshake may crash due to a NULL pointer dereference as a result of incorrect handling of the "signature_algorithms_cert" TLS extension. The crash occurs if an invalid or unrecognised signature algorithm is received from the peer. This could be exploited by a malicious peer in a Denial of Service attack. OpenSSL version 1.1.1d, 1.1.1e, and 1.1.1f are affected by this issue. This issue did not affect OpenSSL versions prior to 1.1.1d. Fixed in OpenSSL 1.1.1g (Affected 1.1.1d-1.1.1f).

CVSS3: 7.5
EPSS: Средний
nvd логотип

CVE-2020-1967

почти 6 лет назад

Server or client applications that call the SSL_check_chain() function during or after a TLS 1.3 handshake may crash due to a NULL pointer dereference as a result of incorrect handling of the "signature_algorithms_cert" TLS extension. The crash occurs if an invalid or unrecognised signature algorithm is received from the peer. This could be exploited by a malicious peer in a Denial of Service attack. OpenSSL version 1.1.1d, 1.1.1e, and 1.1.1f are affected by this issue. This issue did not affect OpenSSL versions prior to 1.1.1d. Fixed in OpenSSL 1.1.1g (Affected 1.1.1d-1.1.1f).

CVSS3: 7.5
EPSS: Средний
debian логотип

CVE-2020-1967

почти 6 лет назад

Server or client applications that call the SSL_check_chain() function ...

CVSS3: 7.5
EPSS: Средний
suse-cvrf логотип

openSUSE-SU-2020:0945-1

больше 5 лет назад

Security update for rust, rust-cbindgen

EPSS: Средний
suse-cvrf логотип

openSUSE-SU-2020:0933-1

больше 5 лет назад

Security update for rust, rust-cbindgen

EPSS: Средний
suse-cvrf логотип

SUSE-SU-2020:2041-1

больше 5 лет назад

Security update for rust, rust-cbindgen

EPSS: Средний
suse-cvrf логотип

SUSE-SU-2020:1058-1

почти 6 лет назад

Security update for openssl-1_1

EPSS: Средний
github логотип

GHSA-jq65-29v4-4x35

больше 4 лет назад

Null pointer deference in openssl-src

CVSS3: 7.5
EPSS: Средний
fstec логотип

BDU:2020-02873

почти 6 лет назад

Уязвимость функции SSL_check_chain реализации протокола TLS библиотеки OpenSSL, связанная с с возможностью разыменования нулевого указателя в результате неправильной обработки TLS расширения «signature_algorithms_cert», позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
EPSS: Средний
msrc логотип

ADV200007

почти 6 лет назад

OpenSSL Remote Denial of Service Vulnerability

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2020-1967

Server or client applications that call the SSL_check_chain() function during or after a TLS 1.3 handshake may crash due to a NULL pointer dereference as a result of incorrect handling of the "signature_algorithms_cert" TLS extension. The crash occurs if an invalid or unrecognised signature algorithm is received from the peer. This could be exploited by a malicious peer in a Denial of Service attack. OpenSSL version 1.1.1d, 1.1.1e, and 1.1.1f are affected by this issue. This issue did not affect OpenSSL versions prior to 1.1.1d. Fixed in OpenSSL 1.1.1g (Affected 1.1.1d-1.1.1f).

CVSS3: 7.5
67%
Средний
почти 6 лет назад
redhat логотип
CVE-2020-1967

Server or client applications that call the SSL_check_chain() function during or after a TLS 1.3 handshake may crash due to a NULL pointer dereference as a result of incorrect handling of the "signature_algorithms_cert" TLS extension. The crash occurs if an invalid or unrecognised signature algorithm is received from the peer. This could be exploited by a malicious peer in a Denial of Service attack. OpenSSL version 1.1.1d, 1.1.1e, and 1.1.1f are affected by this issue. This issue did not affect OpenSSL versions prior to 1.1.1d. Fixed in OpenSSL 1.1.1g (Affected 1.1.1d-1.1.1f).

CVSS3: 7.5
67%
Средний
почти 6 лет назад
nvd логотип
CVE-2020-1967

Server or client applications that call the SSL_check_chain() function during or after a TLS 1.3 handshake may crash due to a NULL pointer dereference as a result of incorrect handling of the "signature_algorithms_cert" TLS extension. The crash occurs if an invalid or unrecognised signature algorithm is received from the peer. This could be exploited by a malicious peer in a Denial of Service attack. OpenSSL version 1.1.1d, 1.1.1e, and 1.1.1f are affected by this issue. This issue did not affect OpenSSL versions prior to 1.1.1d. Fixed in OpenSSL 1.1.1g (Affected 1.1.1d-1.1.1f).

CVSS3: 7.5
67%
Средний
почти 6 лет назад
debian логотип
CVE-2020-1967

Server or client applications that call the SSL_check_chain() function ...

CVSS3: 7.5
67%
Средний
почти 6 лет назад
suse-cvrf логотип
openSUSE-SU-2020:0945-1

Security update for rust, rust-cbindgen

67%
Средний
больше 5 лет назад
suse-cvrf логотип
openSUSE-SU-2020:0933-1

Security update for rust, rust-cbindgen

67%
Средний
больше 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:2041-1

Security update for rust, rust-cbindgen

67%
Средний
больше 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:1058-1

Security update for openssl-1_1

67%
Средний
почти 6 лет назад
github логотип
GHSA-jq65-29v4-4x35

Null pointer deference in openssl-src

CVSS3: 7.5
67%
Средний
больше 4 лет назад
fstec логотип
BDU:2020-02873

Уязвимость функции SSL_check_chain реализации протокола TLS библиотеки OpenSSL, связанная с с возможностью разыменования нулевого указателя в результате неправильной обработки TLS расширения «signature_algorithms_cert», позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
67%
Средний
почти 6 лет назад
msrc логотип
ADV200007

OpenSSL Remote Denial of Service Vulnerability

почти 6 лет назад

Уязвимостей на страницу