CVE-2021-3712

ASN.1 strings are represented internally within OpenSSL as an ASN1_STRING structure which contains a buffer holding the string data and a field holding the buffer length. This contrasts with normal C strings which are repesented as a buffer for the string data which is terminated with a NUL (0) byte. Although not a strict requirement, ASN.1 strings that are parsed using OpenSSL's own "d2i" functions (and other similar parsing functions) as well as any string whose value has been set with the ASN1_STRING_set() function will additionally NUL terminate the byte array in the ASN1_STRING structure. However, it is possible for applications to directly construct valid ASN1_STRING structures which do not NUL terminate the byte array by directly setting the "data" and "length" fields in the ASN1_STRING array. This can also happen by using the ASN1_STRING_set0() function. Numerous OpenSSL functions that print ASN.1 data have been found to assume that the ASN1_STRING byte array will be NUL terminated, even though this is not guaranteed for strings that have been directly constructed. Where an application requests an ASN.1 structure to be printed, and where that ASN.1 structure contains ASN1_STRINGs that have been directly constructed by the application without NUL terminating the "data" field, then a read buffer overrun can occur. The same thing can also occur during name constraints processing of certificates (for example if a certificate has been directly constructed by the application instead of loading it via the OpenSSL parsing functions, and the certificate contains non NUL terminated ASN1_STRING structures). It can also occur in the X509_get1_email(), X509_REQ_get1_email() and X509_get1_ocsp() functions. If a malicious actor can cause an application to directly construct an ASN1_STRING and then process it through one of the affected OpenSSL functions then this issue could be hit. This might result in a crash (causing a Denial of Service attack). It could also result in the disclosure of private memory contents (such as private keys, or sensitive plaintext). Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k). Fixed in OpenSSL 1.0.2za (Affected 1.0.2-1.0.2y).
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.4 HIGH
NETWORK
HIGH
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H
opensslCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 73%
VendorProductVersion
opensslopenssl
1.0.2 ≤
𝑥
< 1.0.2za
opensslopenssl
1.1.1 ≤
𝑥
< 1.1.1l
debiandebian_linux
9.0
debiandebian_linux
10.0
debiandebian_linux
11.0
netappclustered_data_ontap
-
netappclustered_data_ontap_antivirus_connector
-
netappe-series_santricity_os_controller
11.0 ≤
𝑥
≤ 11.50.2
netapphci_management_node
-
netappmanageability_software_development_kit
-
netappsantricity_smi-s_provider
-
netappsolidfire
-
netappstorage_encryption
-
mcafeeepolicy_orchestrator
𝑥
< 5.10.0
mcafeeepolicy_orchestrator
5.10.0
mcafeeepolicy_orchestrator
5.10.0:update_1
mcafeeepolicy_orchestrator
5.10.0:update_10
mcafeeepolicy_orchestrator
5.10.0:update_2
mcafeeepolicy_orchestrator
5.10.0:update_3
mcafeeepolicy_orchestrator
5.10.0:update_4
mcafeeepolicy_orchestrator
5.10.0:update_5
mcafeeepolicy_orchestrator
5.10.0:update_6
mcafeeepolicy_orchestrator
5.10.0:update_7
mcafeeepolicy_orchestrator
5.10.0:update_8
mcafeeepolicy_orchestrator
5.10.0:update_9
tenablenessus_network_monitor
𝑥
< 6.0.0
tenabletenable.sc
5.16.0 ≤
𝑥
≤ 5.19.1
oracleessbase
𝑥
< 11.1.2.4.047
oracleessbase
21.0 ≤
𝑥
< 21.3
oracleessbase
21.3
oraclemysql_connectors
𝑥
≤ 8.0.27
oraclemysql_enterprise_monitor
𝑥
≤ 8.0.25
oraclemysql_server
5.7.0 ≤
𝑥
≤ 5.7.35
oraclemysql_server
8.0.0 ≤
𝑥
≤ 8.0.26
oraclemysql_workbench
𝑥
≤ 8.0.26
oraclepeoplesoft_enterprise_peopletools
8.57
oraclepeoplesoft_enterprise_peopletools
8.58
oraclepeoplesoft_enterprise_peopletools
8.59
oraclesecure_backup
18.1.0.1.0
oraclezfs_storage_appliance_kit
8.8
siemenssinec_infrastructure_network_services
𝑥
< 1.0.1.1
oraclecommunications_cloud_native_core_console
1.9.0
oraclecommunications_cloud_native_core_security_edge_protection_proxy
1.7.0
oraclecommunications_cloud_native_core_unified_data_repository
1.15.0
oraclecommunications_session_border_controller
8.4
oraclecommunications_session_border_controller
9.0
oraclecommunications_unified_session_manager
8.2.5
oraclecommunications_unified_session_manager
8.4.5
oracleenterprise_communications_broker
3.2.0
oracleenterprise_communications_broker
3.3.0
oracleenterprise_session_border_controller
8.4
oracleenterprise_session_border_controller
9.0
oraclehealth_sciences_inform_publisher
6.2.1.0
oraclehealth_sciences_inform_publisher
6.3.1.1
oraclejd_edwards_enterpriseone_tools
𝑥
< 9.2.6.3
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
openssl
bullseye
1.1.1w-0+deb11u1
fixed
bullseye (security)
1.1.1w-0+deb11u2
fixed
bookworm
3.0.14-1~deb12u1
fixed
bookworm (security)
3.0.14-1~deb12u2
fixed
sid
3.3.2-2
fixed
trixie
3.3.2-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
edk2
noble
not-affected
mantic
not-affected
lunar
not-affected
kinetic
not-affected
jammy
needs-triage
impish
ignored
hirsute
Fixed 2020.11-4ubuntu0.1
released
focal
Fixed 0~20191122.bd85bf54-2ubuntu3.3
released
bionic
needs-triage
xenial
needs-triage
trusty
dne
nodejs
noble
not-affected
mantic
not-affected
lunar
not-affected
kinetic
not-affected
jammy
not-affected
impish
not-affected
hirsute
not-affected
focal
not-affected
bionic
not-affected
xenial
not-affected
trusty
not-affected
openssl
noble
Fixed 1.1.1l-1ubuntu1
released
mantic
Fixed 1.1.1l-1ubuntu1
released
lunar
Fixed 1.1.1l-1ubuntu1
released
kinetic
Fixed 1.1.1l-1ubuntu1
released
jammy
Fixed 1.1.1l-1ubuntu1
released
impish
Fixed 1.1.1l-1ubuntu1
released
hirsute
Fixed 1.1.1j-1ubuntu3.5
released
focal
Fixed 1.1.1f-1ubuntu2.8
released
bionic
Fixed 1.1.1-1ubuntu2.1~18.04.13
released
xenial
Fixed 1.0.2g-1ubuntu4.20+esm1
released
trusty
Fixed 1.0.1f-1ubuntu2.27+esm4
released
openssl1.0
noble
dne
mantic
dne
lunar
dne
kinetic
dne
jammy
dne
impish
dne
hirsute
dne
focal
dne
bionic
Fixed 1.0.2n-1ubuntu5.7
released
xenial
dne
trusty
dne
References