Lucene search

K
ibmIBM8F36292DD2EC673F77E7D26F88D6129155EA165304B1A957E549DC327B6DCB50
HistoryJul 30, 2021 - 9:12 p.m.

Security Bulletin: Potential vulnerability in OpenSSL

2021-07-3021:12:39
www.ibm.com
30
openssl
vulnerability
denial of service
remote attacker
ssl
security bypass
certificate chains
wa for cp4d
upgrade

EPSS

0.005

Percentile

76.4%

Summary

A potential vulnerability has been identified related to OpenSSL. Refer to details for additional information.

Vulnerability Details

CVEID:CVE-2021-3449
**DESCRIPTION:**OpenSSL is vulnerable to a denial of service, caused by a NULL pointer dereference in signature_algorithms processing. By sending a specially crafted renegotiation ClientHello message from a client, a remote attacker could exploit this vulnerability to cause the TLS server to crash.
CVSS Base score: 7.5
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/198752 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)

CVEID:CVE-2021-3450
**DESCRIPTION:**OpenSSL could allow a remote attacker to bypass security restrictions, caused by a a missing check in the validation logic of X.509 certificate chains by the X509_V_FLAG_X509_STRICT flag. By using any valid certificate or certificate chain to sign a specially crafted certificate, an attacker could bypass the check that non-CA certificates must not be able to issue other certificates and override the default purpose.
CVSS Base score: 7.4
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/198754 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H)

Affected Products and Versions

Affected Product(s) Version(s)
WA for ICP 1.4.2, 1.5.0

Remediation/Fixes

Upgrade to the latest (4.0.0) release of WA for CP4D which maintains backward compatibility with the versions listed above.

Workarounds and Mitigations

None