Aspera High-Speed Transfer Server (formerly known as Enterprise Server and Connect Server), High-Speed Transfer Endpoint (formerly known as Point-to-Point Client) and Desktop Client application have addressed the following openSSL vulnerabilities.
CVEID: CVE-2017-3738 DESCRIPTION: OpenSSL could allow a remote attacker to obtain sensitive information, caused by an overflow bug in the AVX2 Montgomery multiplication procedure used in exponentiation with 1024-bit moduli. An attacker could exploit this vulnerability to obtain information about the private key. Note: In order to exploit this vulnerability, the server would have to share the DH1024 private key among multiple clients, which is no longer an option since CVE-2016-0701.
CVSS Base Score: 3.1
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/136078 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N)
Affected Products | Affected Versions |
---|---|
Aspera High-Speed Transfer Server | 3.8.0 and earlier |
Aspera High-Speed Transfer Endpoint | 3.8.0 and earlier |
Aspera Desktop Client | 3.8.0 and earlier |
Product | VRMF | APAR | Remediation / First Fix |
---|---|---|---|
Aspera High-Speed Transfer Server | 3.8.1 | N/A | https://downloads.asperasoft.com/en/downloads/1 |
Aspera High-Speed Transfer Endpoint | 3.8.1 | N/A | https://downloads.asperasoft.com/en/downloads/7 |
Aspera Desktop Client | 3.8.1 | N/A | https://downloads.asperasoft.com/en/downloads/2 |
None.
CPE | Name | Operator | Version |
---|---|---|---|
ibm aspera | eq | 3.8.0 |