Lucene search

K
f5F5F5:K32460441
HistoryNov 18, 2016 - 12:00 a.m.

K32460441 : OpenSSL vulnerabilities CVE-2016-7053 and CVE-2016-7054

2016-11-1800:00:00
my.f5.com
18

AI Score

7.3

Confidence

High

EPSS

0.899

Percentile

98.9%

Security Advisory Description

In OpenSSL 1.1.0 before 1.1.0c, applications parsing invalid CMS structures can crash with a NULL pointer dereference. This is caused by a bug in the handling of the ASN.1 CHOICE type in OpenSSL 1.1.0 which can result in a NULL value being passed to the structure callback if an attempt is made to free certain invalid encodings. Only CHOICE structures using a callback which do not handle NULL value are affected.

In OpenSSL 1.1.0 before 1.1.0c, TLS connections using *-CHACHA20-POLY1305 ciphersuites are susceptible to a DoS attack by corrupting larger payloads. This can result in an OpenSSL crash. This issue is not considered to be exploitable beyond a DoS.
Impact
There is no impact; F5 products are not affected by this vulnerability.