[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247862

 
 

909

 
 

194603

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

[3.7] openssl: Multiple vulnerabilities (CVE-2017-3737, CVE-2017-3738)

ID: oval:org.secpod.oval:def:1800136Date: (C)2018-03-29   (M)2024-04-17
Class: PATCHFamily: unix




CVE-2017-3737: Read/write after SSL object in error state¶ OpenSSL 1.0.2 introduced an "error state" mechanism. The intent was that if a fatal error occurred during a handshake thenOpenSSL would move into the error state and would immediately fail if you attempted to continue the handshake. This works as designed for the explicit handshake functions ,however due to a bug it does not work correctly if SSL_read or SSL_write iscalled directly. In that scenario, if the handshake fails then a fatal error will be returned in the initial function call. If SSL_read/SSL_write is subsequently called by the application for the same SSL object then it will succeed and the data is passed without being decrypted/encrypted directly from the SSL/TLS record layer. Fixed In:¶ openssl 1.0.2n

Platform:
Alpine Linux 3.7
Product:
openssl
Reference:
8274
CVE-2017-3737
CVE-2017-3738
CVE    2
CVE-2017-3738
CVE-2017-3737
CPE    12
cpe:/a:openssl:openssl
cpe:/a:openssl:openssl:1.0.2b
cpe:/a:openssl:openssl:1.0.2a
cpe:/a:openssl:openssl:1.0.2d
...

© SecPod Technologies