CVE-2017-3737
Summary
| CVE | CVE-2017-3737 |
|---|---|
| State | PUBLISHED |
| Assigner | openssl |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2017-12-07 16:29:00 UTC |
| Updated | 2025-04-20 01:37:25 UTC |
| Description | OpenSSL 1.0.2 (starting from version 1.0.2b) introduced an "error state" mechanism. The intent was that if a fatal error occurred during a handshake then OpenSSL would move into the error state and would immediately fail if you attempted to continue the handshake. This works as designed for the explicit handshake functions (SSL_do_handshake(), SSL_accept() and SSL_connect()), however due to a bug it does not work correctly if SSL_read() or SSL_write() is called directly. In that scenario, if the handshake fails then a fatal error will be returned in the initial function call. If SSL_read()/SSL_write() is subsequently called by the application for the same SSL object then it will succeed and the data is passed without being decrypted/encrypted directly from the SSL/TLS record layer. In order to exploit this issue an application bug would have to be present that resulted in a call to SSL_read()/SSL_write() being issued after having already received a fatal error. OpenSSL version 1.0.2b-1.0.2m are affected. Fixed in OpenSSL 1.0.2n. OpenSSL 1.1.0 is not affected. |
Risk And Classification
Primary CVSS: v3.0 5.9 MEDIUM from [email protected]
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
Problem Types: CWE-125 | CWE-787 | Unauthenticated read/unencrypted write
| Version | Source | Type | Score | Severity | Vector |
|---|---|---|---|---|---|
| 3.0 | [email protected] | Primary | 5.9 | MEDIUM | CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N |
| 2.0 | [email protected] | Primary | 4.3 | AV:N/AC:M/Au:N/C:P/I:N/A:N |
CVSS v3.0 Breakdown
Attack Vector
NetworkAttack Complexity
HighPrivileges Required
NoneUser Interaction
NoneScope
UnchangedConfidentiality
HighIntegrity
NoneAvailability
NoneCVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
CVSS v2.0 Breakdown
Access Vector
NetworkAccess Complexity
MediumAuthentication
NoneConfidentiality
PartialIntegrity
NoneAvailability
NoneAV:N/AC:M/Au:N/C:P/I:N/A:N
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Operating System | Debian | Debian Linux | 9.0 | All | All | All |
| Application | Openssl | Openssl | 1.0.2b | All | All | All |
| Application | Openssl | Openssl | 1.0.2c | All | All | All |
| Application | Openssl | Openssl | 1.0.2d | All | All | All |
| Application | Openssl | Openssl | 1.0.2e | All | All | All |
| Application | Openssl | Openssl | 1.0.2f | All | All | All |
| Application | Openssl | Openssl | 1.0.2g | All | All | All |
| Application | Openssl | Openssl | 1.0.2h | All | All | All |
| Application | Openssl | Openssl | 1.0.2i | All | All | All |
| Application | Openssl | Openssl | 1.0.2j | All | All | All |
| Application | Openssl | Openssl | 1.0.2k | All | All | All |
| Application | Openssl | Openssl | 1.0.2l | All | All | All |
| Application | Openssl | Openssl | 1.0.2m | All | All | All |
Vendor Declared Affected Products
| Source | Vendor | Product | Version | Platforms |
|---|---|---|---|---|
| CNA | OpenSSL Software Foundation | OpenSSL | affected 1.0.2b-1.0.2m | Not specified |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| www.openssl.org/news/secadv/20171207.txt | af854a3a-2127-422b-91ae-364da2661108 | www.openssl.org | Vendor Advisory |
| OpenSSL CVE-2017-3737 Security Bypass Vulnerability | af854a3a-2127-422b-91ae-364da2661108 | www.securityfocus.com | Third Party Advisory, VDB Entry |
| cert-portal.siemens.com/productcert/pdf/ssa-179516.pdf | af854a3a-2127-422b-91ae-364da2661108 | cert-portal.siemens.com | |
| Red Hat Customer Portal | af854a3a-2127-422b-91ae-364da2661108 | access.redhat.com | |
| Red Hat Customer Portal | af854a3a-2127-422b-91ae-364da2661108 | access.redhat.com | |
| Oracle Critical Patch Update - July 2019 | af854a3a-2127-422b-91ae-364da2661108 | www.oracle.com | |
| CVE-2017-3737: OpenSSL Security Bypass Vulnerability - DigitalMunition | af854a3a-2127-422b-91ae-364da2661108 | www.digitalmunition.me | Third Party Advisory |
| security.FreeBSD.org/advisories/FreeBSD-SA-17:12.openssl.asc | af854a3a-2127-422b-91ae-364da2661108 | security.FreeBSD.org | Third Party Advisory |
| April 2018 MySQL Vulnerabilities in NetApp Products | NetApp Product Security | af854a3a-2127-422b-91ae-364da2661108 | security.netapp.com | |
| January 2018 MySQL vulnerabilities in NetApp Products | NetApp Product Security | af854a3a-2127-422b-91ae-364da2661108 | security.netapp.com | |
| Debian -- Security Information -- DSA-4065-1 openssl1.0 | af854a3a-2127-422b-91ae-364da2661108 | www.debian.org | Third Party Advisory |
| Oracle Critical Patch Update - January 2018 | af854a3a-2127-422b-91ae-364da2661108 | www.oracle.com | |
| Red Hat Customer Portal | af854a3a-2127-422b-91ae-364da2661108 | access.redhat.com | |
| OpenSSL: Multiple vulnerabilities (GLSA 201712-03) — Gentoo security | af854a3a-2127-422b-91ae-364da2661108 | security.gentoo.org | Third Party Advisory |
| December 2017 OpenSSL Vulnerabilities in NetApp Products | NetApp Product Security | af854a3a-2127-422b-91ae-364da2661108 | security.netapp.com | Third Party Advisory |
| Red Hat Customer Portal | af854a3a-2127-422b-91ae-364da2661108 | access.redhat.com | |
| Oracle Critical Patch Update - April 2018 | af854a3a-2127-422b-91ae-364da2661108 | www.oracle.com | |
| OpenSSL Overflow in rsaz_1024_mul_avx2() Lets Remote Users Obtain Potentially Sensitive Information in Certain Cases and SSL_read()/SSL_write() Error State Bug May Bypass Decryption/Encryption in Certain Application Dependent Cases - SecurityTracker | af854a3a-2127-422b-91ae-364da2661108 | www.securitytracker.com | Third Party Advisory, VDB Entry |
| [R2] SecurityCenter 5.6.1 Fixes Multiple Third-party Vulnerabilities - Security Advisory | Tenable® | af854a3a-2127-422b-91ae-364da2661108 | www.tenable.com | |
| Don't allow read/write after fatal error · openssl/openssl@898fb88 · GitHub | af854a3a-2127-422b-91ae-364da2661108 | github.com | |
| CPU July 2018 | af854a3a-2127-422b-91ae-364da2661108 | www.oracle.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 591115 ABB Relion 670 series and Relion 650 series Open Secure Sockets Layer (OpenSSL) Multiple Vulnerabilities (ABBVU-PGGA-1MRG032388)
- 591201 Siemens WinCC (TIA Portal), IPC Diagbase and Simatic Step 7 (TIA Portal) Open Secure Sockets Layer (OpenSSL) Multiple Vulnerabilities (SSA-179516)
- 591261 Siemens MindConnect, S7-1200/1500 CPU family, ET 200SP Open Controller Open Secure Sockets Layer (OpenSSL) Multiple Vulnerabilities (ICSA-18-226-02, SSA-179516)
- 670784 EulerOS Security Update for shim (EulerOS-SA-2021-2542)
- 670808 EulerOS Security Update for shim (EulerOS-SA-2021-2566)
- 710507 Gentoo Linux Open Secure Sockets Layer (OpenSSL) Multiple Vulnerabilities (GLSA 201712-03)