| VID |
22941 |
| Severity |
30 |
| Port |
80, ... |
| Protocol |
TCP |
| Class |
WWW |
| Detailed Description |
The version of OpenSSL installed on the remote host is prior to tested version. It is, therefore, affected by a vulnerability as referenced in the 1.1.1g advisory. - Server or client applications that call the SSL_check_chain() function during or after a TLS 1.3 handshake may crash due to a NULL pointer dereference as a result of incorrect handling of the signature_algorithms_cert TLS extension. The crash occurs if an invalid or unrecognised signature algorithm is received from the peer. This could be exploited by a malicious peer in a Denial of Service attack. OpenSSL version 1.1.1d, 1.1.1e, and 1.1.1f are affected by this issue. This issue did not affect OpenSSL versions prior to 1.1.1d. Fixed in OpenSSL 1.1.1g. (CVE-2020-1967)
* References: https://www.openssl.org/news/secadv/20200421.txt https://github.com/openssl/openssl/commit/eb563247aef3e83dda7679c43f9649270462e5b1
* Platforms Affected: OpenSSL 1.1.1x before 1.1.1g Linux Any version Unix Any version Microsoft Windows Any version |
| Recommendation |
Upgrade to the latest version of OpenSSL (1.1.1g or later), available from the OpenSSL Web site at http://www.openssl.org/ |
| Related URL |
CVE-2020-1967 (CVE) |
| Related URL |
(SecurityFocus) |
| Related URL |
(ISS) |
|