CVE-2017-3735
28.08.2017, 19:29
While parsing an IPAddressFamily extension in an X.509 certificate, it is possible to do a one-byte overread. This would result in an incorrect text display of the certificate. This bug has been present since 2006 and is present in all versions of OpenSSL before 1.0.2m and 1.1.0g.Enginsight
| Vendor | Product | Version |
|---|---|---|
| openssl | openssl | 0.9.7j:j |
| openssl | openssl | 0.9.7k:k |
| openssl | openssl | 0.9.7l:l |
| openssl | openssl | 0.9.7m:m |
| openssl | openssl | 0.9.8 |
| openssl | openssl | 0.9.8a:a |
| openssl | openssl | 0.9.8b:b |
| openssl | openssl | 0.9.8c:c |
| openssl | openssl | 0.9.8d:d |
| openssl | openssl | 0.9.8e:e |
| openssl | openssl | 0.9.8f:f |
| openssl | openssl | 0.9.8g:g |
| openssl | openssl | 0.9.8h:h |
| openssl | openssl | 0.9.8i:i |
| openssl | openssl | 0.9.8j:j |
| openssl | openssl | 0.9.8k:k |
| openssl | openssl | 0.9.8l:l |
| openssl | openssl | 0.9.8m:m |
| openssl | openssl | 0.9.8m:m |
| openssl | openssl | 0.9.8n:n |
| openssl | openssl | 0.9.8o:o |
| openssl | openssl | 0.9.8p:p |
| openssl | openssl | 0.9.8q:q |
| openssl | openssl | 0.9.8r:r |
| openssl | openssl | 0.9.8s:s |
| openssl | openssl | 0.9.8t:t |
| openssl | openssl | 0.9.8u:u |
| openssl | openssl | 0.9.8v:v |
| openssl | openssl | 0.9.8w:w |
| openssl | openssl | 0.9.8x:x |
| openssl | openssl | 0.9.8y:y |
| openssl | openssl | 0.9.8z:z |
| openssl | openssl | 0.9.8za:za |
| openssl | openssl | 0.9.8zb:zb |
| openssl | openssl | 0.9.8zc:zc |
| openssl | openssl | 0.9.8ze:ze |
| openssl | openssl | 0.9.8zg:zg |
| openssl | openssl | 1.0.0 |
| openssl | openssl | 1.0.0:beta1 |
| openssl | openssl | 1.0.0:beta2 |
| openssl | openssl | 1.0.0:beta3 |
| openssl | openssl | 1.0.0:beta4 |
| openssl | openssl | 1.0.0:beta5 |
| openssl | openssl | 1.0.0a:a |
| openssl | openssl | 1.0.0b:b |
| openssl | openssl | 1.0.0c:c |
| openssl | openssl | 1.0.0d:d |
| openssl | openssl | 1.0.0e:e |
| openssl | openssl | 1.0.0f:f |
| openssl | openssl | 1.0.0g:g |
| openssl | openssl | 1.0.0h:h |
| openssl | openssl | 1.0.0i:i |
| openssl | openssl | 1.0.0j:j |
| openssl | openssl | 1.0.0k:k |
| openssl | openssl | 1.0.0l:l |
| openssl | openssl | 1.0.0m:m |
| openssl | openssl | 1.0.0n:n |
| openssl | openssl | 1.0.0o:o |
| openssl | openssl | 1.0.0p:p |
| openssl | openssl | 1.0.0q:q |
| openssl | openssl | 1.0.0r:r |
| openssl | openssl | 1.0.0s:s |
| openssl | openssl | 1.0.1 |
| openssl | openssl | 1.0.1:beta1 |
| openssl | openssl | 1.0.1:beta2 |
| openssl | openssl | 1.0.1:beta3 |
| openssl | openssl | 1.0.1a:a |
| openssl | openssl | 1.0.1b:b |
| openssl | openssl | 1.0.1c:c |
| openssl | openssl | 1.0.1d:d |
| openssl | openssl | 1.0.1e:e |
| openssl | openssl | 1.0.1f:f |
| openssl | openssl | 1.0.1g:g |
| openssl | openssl | 1.0.1h:h |
| openssl | openssl | 1.0.1i:i |
| openssl | openssl | 1.0.1j:j |
| openssl | openssl | 1.0.1k:k |
| openssl | openssl | 1.0.1l:l |
| openssl | openssl | 1.0.2 |
| openssl | openssl | 1.0.2:beta1 |
| openssl | openssl | 1.0.2:beta2 |
| openssl | openssl | 1.0.2:beta3 |
| openssl | openssl | 1.0.2a:a |
| openssl | openssl | 1.0.2b:b |
| openssl | openssl | 1.0.2c:c |
| openssl | openssl | 1.0.2d:d |
| openssl | openssl | 1.0.2e:e |
| openssl | openssl | 1.0.2f:f |
| openssl | openssl | 1.0.2h:h |
| openssl | openssl | 1.0.2i:i |
| openssl | openssl | 1.0.2j:j |
| openssl | openssl | 1.0.2k:k |
| openssl | openssl | 1.0.2l:l |
| openssl | openssl | 1.1.0 |
| openssl | openssl | 1.1.0a:a |
| openssl | openssl | 1.1.0b:b |
| openssl | openssl | 1.1.0c:c |
| openssl | openssl | 1.1.0d:d |
| openssl | openssl | 1.1.0e:e |
| openssl | openssl | 1.1.0f:f |
| debian | debian_linux | 8.0 |
| debian | debian_linux | 9.0 |
𝑥
= Vulnerable software versions
Debian Releases
Ubuntu Releases
Ubuntu Product | |||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| openssl |
| ||||||||||||||
| openssl098 |
| ||||||||||||||
| openssl1.0 |
|
Common Weakness Enumeration
References