5 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:L/Au:N/C:N/I:P/A:N
5.3 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
6.5 Medium
AI Score
Confidence
High
0.028 Low
EPSS
Percentile
90.7%
While parsing an IPAddressFamily extension in an X.509 certificate, it is possible to do a one-byte overread. This would result in an incorrect text display of the certificate. This bug has been present since 2006 and is present in all versions of OpenSSL before 1.0.2m and 1.1.0g.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Alpine | 3.3-main | noarch | openssl | < 1.0.2m-r0 | UNKNOWN |
Alpine | 3.4-main | noarch | openssl | < 1.0.2m-r0 | UNKNOWN |
Alpine | 3.5-main | noarch | openssl | < 1.0.2m-r0 | UNKNOWN |
Alpine | 3.6-main | noarch | openssl | < 1.0.2m-r0 | UNKNOWN |
Alpine | 3.7-main | noarch | openssl | < 1.0.2m-r0 | UNKNOWN |
Alpine | 3.8-main | noarch | openssl | < 1.0.2m-r0 | UNKNOWN |
5 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:L/Au:N/C:N/I:P/A:N
5.3 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
6.5 Medium
AI Score
Confidence
High
0.028 Low
EPSS
Percentile
90.7%