Aspera High-Speed Transfer Server (formerly known as Enterprise Server and Connect Server), High-Speed Transfer Endpoint (formerly known as Point-to-Point Client) and Desktop Client application have addressed the following openSSL vulnerabilities.
CVEID: CVE-2017-3736 DESCRIPTION: OpenSSL could allow a remote attacker to obtain sensitive information, caused by a carry propagation flaw in the x86_64 Montgomery squaring function bn_sqrx8x_internal(). An attacker with online access to an unpatched system could exploit this vulnerability to obtain information about the private key.
CVSS Base Score: 5.9
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/134397 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N)
Affected Product | Affected Versions |
---|---|
Aspera High-Speed Transfer Server | 3.8.0 and earlier |
Aspera High-Speed Transfer Endpoint | 3.8.0 and earlier |
Aspera Desktop Client | 3.8.0 and earlier |
Product | VRMF | APAR | Remediation / First Fix |
---|---|---|---|
Aspera High-Speed Transfer Server | 3.8.1 | N/A | https://downloads.asperasoft.com/en/downloads/1 |
Aspera High-Speed Transfer Endpoint | 3.8.1 | N/A | https://downloads.asperasoft.com/en/downloads/7 |
Aspera Desktop Client | 3.8.1 | N/A | https://downloads.asperasoft.com/en/downloads/2 |
None