OpenSSL 缓冲区溢出漏洞

admin 2023-11-30 20:19:02 Ali_nvd 来源:ZONE.CI 全球网 0 阅读模式
中危 OpenSSL 缓冲区溢出漏洞

CVE编号

CVE-2021-3712

利用情况

暂无

补丁情况

官方补丁

披露时间

2021-08-24
漏洞描述
该漏洞为处理ASN.1字符串造成的缓冲区溢出漏洞,是由于X509_aux_print()函数中处理ASN.1字符串时的的缓冲区溢出缺陷导致。攻击者可以利用该漏洞导致拒绝服务或可能导致私钥泄露内容等危害
解决建议
受影响版本:OpenSSL <= 1.1.1kOpenSSL <= 1.0.2y将OpenSSL升级到1.1.1l、1.0.2za或最新版本(注意OpenSSL 1.0.2官方将很快不再支持)
参考链接
http://www.openwall.com/lists/oss-security/2021/08/26/2
https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cloud.tencent.com/announce/detail/1567
https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=94d23fcff9b2...
https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=ccb0a11145ee...
https://kc.mcafee.com/corporate/index?page=content&id=SB10366
https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249...
https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17...
https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html
https://security.gentoo.org/glsa/202209-02
https://security.gentoo.org/glsa/202210-02
https://security.netapp.com/advisory/ntap-20210827-0010/
https://www.debian.org/security/2021/dsa-4963
https://www.openssl.org/news/secadv/20210824.txt
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.tenable.com/security/tns-2021-16
https://www.tenable.com/security/tns-2022-02
受影响软件情况
# 类型 厂商 产品 版本 影响面
1
运行在以下环境
应用 netapp clustered_data_ontap - -
运行在以下环境
应用 netapp clustered_data_ontap_antivirus_connector - -
运行在以下环境
应用 netapp e-series_santricity_os_controller * From (including) 11.0 Up to (including) 11.50.2
运行在以下环境
应用 netapp hci_management_node - -
运行在以下环境
应用 netapp manageability_software_development_kit - -
运行在以下环境
应用 netapp santricity_smi-s_provider - -
运行在以下环境
应用 netapp solidfire - -
运行在以下环境
应用 netapp storage_encryption - -
运行在以下环境
应用 openssl openssl * From (including) 1.0.2 Up to (excluding) 1.0.2za
运行在以下环境
应用 openssl openssl * From (including) 1.1.1 Up to (excluding) 1.1.1l
运行在以下环境
系统 alibaba_cloud_linux_2.1903 openssl-libs * Up to (excluding) 1.0.2k-23.1.al7
运行在以下环境
系统 alpine_3.11 openssl * Up to (excluding) 1.1.1l-r0
运行在以下环境
系统 alpine_3.12 openssl * Up to (excluding) 1.1.1l-r0
运行在以下环境
系统 alpine_3.13 openssl * Up to (excluding) 1.1.1l-r0
运行在以下环境
系统 alpine_3.14 openssl * Up to (excluding) 1.1.1l-r0
运行在以下环境
系统 alpine_3.15 openssl * Up to (excluding) 1.1.1l-r0
运行在以下环境
系统 alpine_3.16 openssl * Up to (excluding) 1.1.1l-r0
运行在以下环境
系统 alpine_3.17 openssl * Up to (excluding) 1.1.1l-r0
运行在以下环境
系统 alpine_3.18 openssl * Up to (excluding) 1.1.1l-r0
运行在以下环境
系统 alpine_edge openssl * Up to (excluding) 1.1.1l-r0
运行在以下环境
系统 amazon_2 openssl * Up to (excluding) 1.1.1g-12.amzn2.0.4
运行在以下环境
系统 amazon_AMI openssl * Up to (excluding) 1.0.2k-16.154.amzn1
运行在以下环境
系统 anolis_os_7 openssl-devel * Up to (excluding) 1.0.2k-23
运行在以下环境
系统 anolis_os_8 openssl-perl * Up to (excluding) 1.1.1k-5
运行在以下环境
系统 centos_7 openssl * Up to (excluding) 1.0.2k-23.el7_9
运行在以下环境
系统 centos_8 openssl-debugsource * Up to (excluding) 1.1.1k-5.el8_5
运行在以下环境
系统 debian_10 openssl * Up to (excluding) 1.1.1d-0+deb10u7
运行在以下环境
系统 debian_11 openssl * Up to (excluding) 1.1.1k-1+deb11u1
运行在以下环境
系统 debian_12 openssl * Up to (excluding) 1.1.1l-1
运行在以下环境
系统 debian_9 openssl * Up to (excluding) 1.1.0l-1~deb9u4
运行在以下环境
系统 debian_sid openssl * Up to (excluding) 1.1.1l-1
运行在以下环境
系统 fedora_EPEL_7 openssl11-debuginfo * Up to (excluding) 1.1.1k-2.el7
运行在以下环境
系统 kylinos_aarch64_V10 openssl * Up to (excluding) 1.0.2k-21.el7_9.ns7.03
运行在以下环境
系统 kylinos_x86_64_V10 openssl * Up to (excluding) 1.0.2k-21.el7_9.ns7.03
运行在以下环境
系统 opensuse_Leap_15.2 libopenssl1_1-hmac * Up to (excluding) 1.0.2p-lp152.8.15.1
运行在以下环境
系统 opensuse_Leap_15.3 libopenssl1_1-hmac * Up to (excluding) 1.0.2p-3.40.2
运行在以下环境
系统 oracle_7 oraclelinux-release * Up to (excluding) 1.0.2k-23.el7_9
运行在以下环境
系统 oracle_8 oraclelinux-release * Up to (excluding) 1.1.1k-5.ksplice1.el8_5
运行在以下环境
系统 redhat_7 openssl * Up to (excluding) 1.0.2k-23.el7_9
运行在以下环境
系统 redhat_8 openssl-debugsource * Up to (excluding) 1.1.1k-5.el8_5
运行在以下环境
系统 suse_12_SP5 libopenssl1_1 * Up to (excluding) 1.0.2p-3.39.3
运行在以下环境
系统 ubuntu_18.04 openssl1.0 * Up to (excluding) 1.1.1-1ubuntu2.1~18.04.13
运行在以下环境
系统 ubuntu_18.04.5_lts openssl * Up to (excluding) 1.1.1-1ubuntu2.1~18.04.13
运行在以下环境
系统 ubuntu_20.04 edk2 * Up to (excluding) 0~20191122.bd85bf54-2ubuntu3.3
运行在以下环境
系统 ubuntu_21.04 edk2 * Up to (excluding) 2020.11-4ubuntu0.1
运行在以下环境
系统 ubuntu_21.10 openssl * Up to (excluding) 1.1.1l-1ubuntu1
运行在以下环境
系统 ubuntu_22.04 openssl * Up to (excluding) 1.1.1l-1ubuntu1
运行在以下环境
系统 ubuntu_22.10 openssl * Up to (excluding) 1.1.1l-1ubuntu1
运行在以下环境
系统 unionos_a openssl * Up to (excluding) openssl-1.1.1g-15.uelc20.07
运行在以下环境
系统 unionos_e shim * Up to (excluding) openssl-1:1.1.1f-11
阿里云评分 6.3
  • 攻击路径 远程
  • 攻击复杂度 复杂
  • 权限要求 无需权限
  • 影响范围 全局影响
  • EXP成熟度 未验证
  • 补丁情况 官方补丁
  • 数据保密性 数据泄露
  • 数据完整性 无影响
  • 服务器危害 无影响
  • 全网数量 N/A
CWE-ID 漏洞类型
CWE-125 跨界内存读
- avd.aliyun.com
weinxin
版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
N/A Ali_nvd

N/A

N/ACVE编号 CVE-2024-9120利用情况 暂无补丁情况 N/A披露时间 2024-09-23漏洞描述Use after free in Dawn
评论:0   参与:  0