Lucene search

K
freebsdFreeBSD21F505F4-6A1C-11EF-B611-84A93843EB75
HistorySep 03, 2024 - 12:00 a.m.

OpenSSL -- Multiple vulnerabilities

2024-09-0300:00:00
vuxml.freebsd.org
10
denial of service
x.509 name checks
tls clients
ssl_select_next_proto
buffer overread
memory address
abnormal termination
crash
memory contents
unix

CVSS3

9.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H

AI Score

7.5

Confidence

High

EPSS

0

Percentile

16.3%

The OpenSSL project reports:

Possible denial of service in X.509 name checks [Moderate severity]
Applications performing certificate name checks (e.g., TLS clients
checking server certificates) may attempt to read an invalid
memory address resulting in abnormal termination of the application
process.
SSL_select_next_proto buffer overread [Low severity]
Calling the OpenSSL API function SSL_select_next_proto with an empty
supported client protocols buffer may cause a crash or memory
contents to be sent to the peer.

CVSS3

9.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H

AI Score

7.5

Confidence

High

EPSS

0

Percentile

16.3%