Lucene search

K
ibmIBM4E6353F1062DDEE2F859DA9376A59A0A02E58324E8A0BB460968024ADB369792
HistoryDec 17, 2020 - 5:49 p.m.

Security Bulletin: z/TPF is affected by an OpenSSL vulnerability

2020-12-1717:49:02
www.ibm.com
21
z/tpf
openssl
vulnerability
cve-2020-1971
denial of service
null pointer
crash
cvss
7.5
fix
apar
download
ibm
maintenance

EPSS

0.004

Percentile

74.4%

Summary

The z/TPF version of OpenSSL was updated to address the vulnerability described by CVE-2020-1971.

Vulnerability Details

CVEID:CVE-2020-1971
**DESCRIPTION:**OpenSSL is vulnerable to a denial of service, caused by a NULL pointer dereference. If the GENERAL_NAME_cmp function contain an EDIPARTYNAME, an attacker could exploit this vulnerability to cause the application to crash.
CVSS Base score: 7.5
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/192748 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)

Affected Products and Versions

Affected Product Version
z/Transaction Processing Facility 1.1

Remediation/Fixes

Product VRMF APAR Remediation/First Fix
z/TPF 1.1 PJ46385 Apply the APAR, which is available for download from the TPF Family Products: Maintenance web page.

Workarounds and Mitigations

None