CVE-2020-1967

Server or client applications that call the SSL_check_chain() function during or after a TLS 1.3 handshake may crash due to a NULL pointer dereference as a result of incorrect handling of the "signature_algorithms_cert" TLS extension. The crash occurs if an invalid or unrecognised signature algorithm is received from the peer. This could be exploited by a malicious peer in a Denial of Service attack. OpenSSL version 1.1.1d, 1.1.1e, and 1.1.1f are affected by this issue. This issue did not affect OpenSSL versions prior to 1.1.1d. Fixed in OpenSSL 1.1.1g (Affected 1.1.1d-1.1.1f).
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
opensslCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 98%
VendorProductVersion
opensslopenssl
1.1.1d ≤
𝑥
≤ 1.1.1f
debiandebian_linux
9.0
debiandebian_linux
10.0
freebsdfreebsd
12.1
oracleapplication_server
12.1.3
oracleenterprise_manager_base_platform
13.4.0.0
oracleenterprise_manager_for_storage_management
13.3.0.0
oracleenterprise_manager_for_storage_management
13.4.0.0
oracleenterprise_manager_ops_center
12.4.0
oraclehttp_server
12.2.1.4.0
oraclemysql
𝑥
≤ 5.6.48
oraclemysql
5.7.0 ≤
𝑥
≤ 5.7.30
oraclemysql
8.0.0 ≤
𝑥
≤ 8.0.20
oraclemysql_connectors
𝑥
≤ 8.0.20
oraclemysql_enterprise_monitor
𝑥
≤ 4.0.12
oraclemysql_enterprise_monitor
8.0.0 ≤
𝑥
≤ 8.0.20
oraclemysql_workbench
𝑥
≤ 8.0.21
oraclepeoplesoft_enterprise_peopletools
8.56
oraclepeoplesoft_enterprise_peopletools
8.57
oraclepeoplesoft_enterprise_peopletools
8.58
oraclepeoplesoft_enterprise_peopletools
8.59
netappactive_iq_unified_manager
7.3 ≤
netappactive_iq_unified_manager
9.5 ≤
netappe-series_performance_analyzer
-
netapponcommand_insight
-
netapponcommand_workflow_automation
-
netappsmi-s_provider
-
netappsnapcenter
-
netappsteelstore_cloud_integrated_storage
-
broadcomfabric_operating_system
-
opensuseleap
15.1
opensuseleap
15.2
jdedwardsenterpriseone
𝑥
< 9.2.5.0
tenablelog_correlation_engine
𝑥
< 6.0.9
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
openssl
bullseye
1.1.1w-0+deb11u1
fixed
stretch
not-affected
jessie
not-affected
bullseye (security)
1.1.1w-0+deb11u2
fixed
bookworm
3.0.14-1~deb12u1
fixed
bookworm (security)
3.0.14-1~deb12u2
fixed
sid
3.3.2-2
fixed
trixie
3.3.2-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
edk2
focal
not-affected
eoan
not-affected
bionic
not-affected
xenial
not-affected
trusty
dne
openssl
focal
Fixed 1.1.1f-1ubuntu2
released
eoan
not-affected
bionic
not-affected
xenial
not-affected
trusty
not-affected
openssl1.0
focal
dne
eoan
dne
bionic
not-affected
xenial
dne
trusty
dne
References