CVE-2018-0739
27.03.2018, 21:29
Constructed ASN.1 types with a recursive definition (such as can be found in PKCS7) could eventually exceed the stack given malicious input with excessive recursion. This could result in a Denial Of Service attack. There are no such structures used within SSL/TLS that come from untrusted sources so this is considered safe. Fixed in OpenSSL 1.1.0h (Affected 1.1.0-1.1.0g). Fixed in OpenSSL 1.0.2o (Affected 1.0.2b-1.0.2n).Enginsight
| Vendor | Product | Version |
|---|---|---|
| openssl | openssl | 1.0.2b ≤ 𝑥 ≤ 1.0.2n |
| openssl | openssl | 1.1.0 ≤ 𝑥 ≤ 1.1.0g |
| canonical | ubuntu_linux | 14.04 |
| canonical | ubuntu_linux | 16.04 |
| canonical | ubuntu_linux | 17.10 |
| debian | debian_linux | 7.0 |
| debian | debian_linux | 8.0 |
| debian | debian_linux | 9.0 |
𝑥
= Vulnerable software versions
Debian Releases
Debian Product | |||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| libtomcrypt |
| ||||||||||||||||
| openssl |
|
Ubuntu Releases
Ubuntu Product | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| openssl |
| ||||||||||||
| openssl098 |
| ||||||||||||
| openssl1.0 |
|
Common Weakness Enumeration
References