cpe:/a:openssl:openssl:0.9.7j cpe:/a:openssl:openssl:0.9.7k cpe:/a:openssl:openssl:0.9.7l cpe:/a:openssl:openssl:0.9.7m cpe:/a:openssl:openssl:0.9.8 cpe:/a:openssl:openssl:0.9.8a cpe:/a:openssl:openssl:0.9.8b cpe:/a:openssl:openssl:0.9.8c cpe:/a:openssl:openssl:0.9.8d cpe:/a:openssl:openssl:0.9.8e cpe:/a:openssl:openssl:0.9.8f cpe:/a:openssl:openssl:0.9.8g cpe:/a:openssl:openssl:0.9.8h cpe:/a:openssl:openssl:0.9.8i cpe:/a:openssl:openssl:0.9.8j cpe:/a:openssl:openssl:0.9.8k cpe:/a:openssl:openssl:0.9.8l cpe:/a:openssl:openssl:0.9.8m cpe:/a:openssl:openssl:0.9.8m:beta1 cpe:/a:openssl:openssl:0.9.8n cpe:/a:openssl:openssl:0.9.8o cpe:/a:openssl:openssl:0.9.8p cpe:/a:openssl:openssl:0.9.8q cpe:/a:openssl:openssl:0.9.8r cpe:/a:openssl:openssl:0.9.8s cpe:/a:openssl:openssl:0.9.8t cpe:/a:openssl:openssl:0.9.8u cpe:/a:openssl:openssl:0.9.8v cpe:/a:openssl:openssl:0.9.8w cpe:/a:openssl:openssl:0.9.8x cpe:/a:openssl:openssl:0.9.8y cpe:/a:openssl:openssl:0.9.8z cpe:/a:openssl:openssl:0.9.8za cpe:/a:openssl:openssl:0.9.8zb cpe:/a:openssl:openssl:0.9.8zc cpe:/a:openssl:openssl:0.9.8ze cpe:/a:openssl:openssl:0.9.8zg cpe:/a:openssl:openssl:1.0.0 cpe:/a:openssl:openssl:1.0.0:beta1 cpe:/a:openssl:openssl:1.0.0:beta2 cpe:/a:openssl:openssl:1.0.0:beta3 cpe:/a:openssl:openssl:1.0.0:beta4 cpe:/a:openssl:openssl:1.0.0:beta5 cpe:/a:openssl:openssl:1.0.0a cpe:/a:openssl:openssl:1.0.0b cpe:/a:openssl:openssl:1.0.0c cpe:/a:openssl:openssl:1.0.0d cpe:/a:openssl:openssl:1.0.0e cpe:/a:openssl:openssl:1.0.0f cpe:/a:openssl:openssl:1.0.0g cpe:/a:openssl:openssl:1.0.0h cpe:/a:openssl:openssl:1.0.0i cpe:/a:openssl:openssl:1.0.0j cpe:/a:openssl:openssl:1.0.0k cpe:/a:openssl:openssl:1.0.0l cpe:/a:openssl:openssl:1.0.0m cpe:/a:openssl:openssl:1.0.0n cpe:/a:openssl:openssl:1.0.0o cpe:/a:openssl:openssl:1.0.0p cpe:/a:openssl:openssl:1.0.0q cpe:/a:openssl:openssl:1.0.0r cpe:/a:openssl:openssl:1.0.0s cpe:/a:openssl:openssl:1.0.1 cpe:/a:openssl:openssl:1.0.1:beta1 cpe:/a:openssl:openssl:1.0.1:beta2 cpe:/a:openssl:openssl:1.0.1:beta3 cpe:/a:openssl:openssl:1.0.1a cpe:/a:openssl:openssl:1.0.1b cpe:/a:openssl:openssl:1.0.1c cpe:/a:openssl:openssl:1.0.1d cpe:/a:openssl:openssl:1.0.1e cpe:/a:openssl:openssl:1.0.1f cpe:/a:openssl:openssl:1.0.1g cpe:/a:openssl:openssl:1.0.1h cpe:/a:openssl:openssl:1.0.1i cpe:/a:openssl:openssl:1.0.1j cpe:/a:openssl:openssl:1.0.1k cpe:/a:openssl:openssl:1.0.1l cpe:/a:openssl:openssl:1.0.2 cpe:/a:openssl:openssl:1.0.2:beta1 cpe:/a:openssl:openssl:1.0.2:beta2 cpe:/a:openssl:openssl:1.0.2:beta3 cpe:/a:openssl:openssl:1.0.2a cpe:/a:openssl:openssl:1.0.2b cpe:/a:openssl:openssl:1.0.2c cpe:/a:openssl:openssl:1.0.2d cpe:/a:openssl:openssl:1.0.2e cpe:/a:openssl:openssl:1.0.2f cpe:/a:openssl:openssl:1.0.2h cpe:/a:openssl:openssl:1.0.2i cpe:/a:openssl:openssl:1.0.2j cpe:/a:openssl:openssl:1.0.2k cpe:/a:openssl:openssl:1.0.2l cpe:/a:openssl:openssl:1.1.0 cpe:/a:openssl:openssl:1.1.0a cpe:/a:openssl:openssl:1.1.0b cpe:/a:openssl:openssl:1.1.0c cpe:/a:openssl:openssl:1.1.0d cpe:/a:openssl:openssl:1.1.0e cpe:/a:openssl:openssl:1.1.0f cpe:/o:debian:debian_linux:8.0 cpe:/o:debian:debian_linux:9.0 CVE-2017-3735 2017-08-28T15:29:01.353-04:00 2019-04-23T15:30:01.520-04:00 5.0 NETWORK LOW NONE NONE PARTIAL NONE http://nvd.nist.gov BID 100515 SECTRACK 1039726 DEBIAN DSA-4017 DEBIAN DSA-4018 FREEBSD FreeBSD-SA-17:11 GENTOO GLSA-201712-03 REDHAT RHSA-2018:3221 REDHAT RHSA-2018:3505 UBUNTU USN-3611-2 MLIST [debian-lts-announce] 20171109 [SECURITY] [DLA-1157-1] openssl security update CONFIRM http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html CONFIRM http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html CONFIRM http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html CONFIRM http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html MISC https://github.com/openssl/openssl/commit/068b963bb7afc57f5bdd723de0dd15e7795d5822 CONFIRM https://security.netapp.com/advisory/ntap-20170927-0001/ CONFIRM https://security.netapp.com/advisory/ntap-20171107-0002/ CONFIRM https://support.apple.com/HT208331 CONFIRM https://www.openssl.org/news/secadv/20170828.txt CONFIRM https://www.openssl.org/news/secadv/20171102.txt MISC https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html CONFIRM https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html CONFIRM https://www.tenable.com/security/tns-2017-14 CONFIRM https://www.tenable.com/security/tns-2017-15 While parsing an IPAddressFamily extension in an X.509 certificate, it is possible to do a one-byte overread. This would result in an incorrect text display of the certificate. This bug has been present since 2006 and is present in all versions of OpenSSL before 1.0.2m and 1.1.0g.