5.8 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:N/A:P
7.4 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H
8 High
AI Score
Confidence
High
0.004 Low
EPSS
Percentile
72.0%
Debian LTS Advisory DLA-2766-1 [email protected]
https://www.debian.org/lts/security/ Thorsten Alteholz
September 27, 2021 https://wiki.debian.org/LTS
Package : openssl
Version : 1.1.0l-1~deb9u4
CVE ID : CVE-2021-3712
An issue has been found in openssl, a Secure Sockets Layer toolkit.
Ingo Schwarze reported a buffer overrun flaw when processing ASN.1
strings, which can result in denial of service.
For Debian 9 stretch, this problem has been fixed in version
1.1.0l-1~deb9u4.
We recommend that you upgrade your openssl packages.
For the detailed security status of openssl please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/openssl
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 9 | amd64 | libcrypto1.1-udeb | < 1.1.0l-1~deb9u4 | libcrypto1.1-udeb_1.1.0l-1~deb9u4_amd64.deb |
Debian | 9 | arm64 | libssl1.1 | < 1.1.0l-1~deb9u4 | libssl1.1_1.1.0l-1~deb9u4_arm64.deb |
Debian | 10 | armhf | openssl-dbgsym | < 1.1.1d-0+deb10u7 | openssl-dbgsym_1.1.1d-0+deb10u7_armhf.deb |
Debian | 9 | armel | libssl1.0.2-udeb | < 1.0.2u-1~deb9u6 | libssl1.0.2-udeb_1.0.2u-1~deb9u6_armel.deb |
Debian | 11 | armhf | openssl | < 1.1.1k-1+deb11u1 | openssl_1.1.1k-1+deb11u1_armhf.deb |
Debian | 10 | arm64 | libcrypto1.1-udeb | < 1.1.1d-0+deb10u7 | libcrypto1.1-udeb_1.1.1d-0+deb10u7_arm64.deb |
Debian | 11 | mips64el | libssl1.1 | < 1.1.1k-1+deb11u1 | libssl1.1_1.1.1k-1+deb11u1_mips64el.deb |
Debian | 10 | armhf | openssl | < 1.1.1d-0+deb10u7 | openssl_1.1.1d-0+deb10u7_armhf.deb |
Debian | 10 | ppc64el | libcrypto1.1-udeb | < 1.1.1d-0+deb10u7 | libcrypto1.1-udeb_1.1.1d-0+deb10u7_ppc64el.deb |
Debian | 10 | amd64 | libssl-dev | < 1.1.1d-0+deb10u7 | libssl-dev_1.1.1d-0+deb10u7_amd64.deb |
5.8 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:N/A:P
7.4 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H
8 High
AI Score
Confidence
High
0.004 Low
EPSS
Percentile
72.0%