VID |
22941 |
Severity |
30 |
Port |
80, ... |
Protocol |
TCP |
Class |
WWW |
Detailed Description |
The version of OpenSSL installed on the remote host is prior to tested version. It is, therefore, affected by a vulnerability as referenced in the 1.1.1g advisory. - Server or client applications that call the SSL_check_chain() function during or after a TLS 1.3 handshake may crash due to a NULL pointer dereference as a result of incorrect handling of the signature_algorithms_cert TLS extension. The crash occurs if an invalid or unrecognised signature algorithm is received from the peer. This could be exploited by a malicious peer in a Denial of Service attack. OpenSSL version 1.1.1d, 1.1.1e, and 1.1.1f are affected by this issue. This issue did not affect OpenSSL versions prior to 1.1.1d. Fixed in OpenSSL 1.1.1g. (CVE-2020-1967)
* References: https://www.openssl.org/news/secadv/20200421.txt https://github.com/openssl/openssl/commit/eb563247aef3e83dda7679c43f9649270462e5b1
* Platforms Affected: OpenSSL 1.1.1x before 1.1.1g Linux Any version Unix Any version Microsoft Windows Any version |
Recommendation |
Upgrade to the latest version of OpenSSL (1.1.1g or later), available from the OpenSSL Web site at http://www.openssl.org/ |
Related URL |
CVE-2020-1967 (CVE) |
Related URL |
(SecurityFocus) |
Related URL |
(ISS) |
|