CVE-2018-0739

Summary

CVECVE-2018-0739
StatePUBLIC
Assigner[email protected]
Source PriorityCVE Program / NVD first with legacy fallback
Published2018-03-27 21:29:00 UTC
Updated2023-11-07 02:51:00 UTC
DescriptionConstructed ASN.1 types with a recursive definition (such as can be found in PKCS7) could eventually exceed the stack given malicious input with excessive recursion. This could result in a Denial Of Service attack. There are no such structures used within SSL/TLS that come from untrusted sources so this is considered safe. Fixed in OpenSSL 1.1.0h (Affected 1.1.0-1.1.0g). Fixed in OpenSSL 1.0.2o (Affected 1.0.2b-1.0.2n).

Risk And Classification

Problem Types: CWE-674

NVD Known Affected Configurations (CPE 2.3)

TypeVendorProductVersionUpdateEditionLanguage
Operating System Canonical Ubuntu Linux 14.04 All All All
Operating System Canonical Ubuntu Linux 16.04 All All All
Operating System Canonical Ubuntu Linux 17.10 All All All
Operating System Canonical Ubuntu Linux 14.04 All All All
Operating System Canonical Ubuntu Linux 16.04 All All All
Operating System Canonical Ubuntu Linux 17.10 All All All
Operating System Debian Debian Linux 7.0 All All All
Operating System Debian Debian Linux 8.0 All All All
Operating System Debian Debian Linux 9.0 All All All
Operating System Debian Debian Linux 7.0 All All All
Operating System Debian Debian Linux 8.0 All All All
Operating System Debian Debian Linux 9.0 All All All
Application Openssl Openssl All All All All
Application Openssl Openssl All All All All

References

ReferenceSourceLinkTags
Red Hat Customer Portal REDHAT access.redhat.com
Red Hat Customer Portal REDHAT access.redhat.com
OpenSSL CVE-2018-0739 Denial of Service Vulnerability BID www.securityfocus.com Third Party Advisory, VDB Entry
Red Hat Customer Portal REDHAT access.redhat.com
PAN-SA-2018-0015 OpenSSL Vulnerabilities in PAN-OS CONFIRM securityadvisories.paloaltonetworks.com
OpenSSL: Multiple vulnerabilities (GLSA 201811-21) — Gentoo security GENTOO security.gentoo.org
git.openssl.org Git - openssl.git/commitdiff git.openssl.org
CPU July 2018 CONFIRM www.oracle.com
Oracle Critical Patch Update - April 2018 CONFIRM www.oracle.com Patch, Third Party Advisory
Red Hat Customer Portal REDHAT access.redhat.com
March 2018 OpenSSL Vulnerabilities in NetApp Products | NetApp Product Security CONFIRM security.netapp.com Third Party Advisory
Oracle Critical Patch Update Advisory - July 2021 N/A www.oracle.com
Red Hat Customer Portal REDHAT access.redhat.com
Oracle PeopleSoft Enterprise PeopleTools Multiple Remote Security Vulnerabilities BID www.securityfocus.com
July 2018 MySQL Vulnerabilities in NetApp Products | NetApp Product Security CONFIRM security.netapp.com
www.openssl.org/news/secadv/20180327.txt CONFIRM www.openssl.org Vendor Advisory
USN-3611-2: OpenSSL vulnerabilities | Ubuntu security notices UBUNTU usn.ubuntu.com Third Party Advisory
[R1] Nessus Network Monitor 5.5.0 Fixes One Third-party Vulnerability - Security Advisory | Tenable® CONFIRM www.tenable.com
Oracle Critical Patch Update - January 2019 CONFIRM www.oracle.com
Debian -- Security Information -- DSA-4157-1 openssl DEBIAN www.debian.org Third Party Advisory
March 2018 Security Releases | Node.js CONFIRM nodejs.org
[SECURITY] [DLA 1330-1] openssl security update MLIST lists.debian.org Third Party Advisory
Dropbear: Multiple vulnerabilities (GLSA 202007-53) — Gentoo security GENTOO security.gentoo.org
Oracle Critical Patch Update - July 2019 MISC www.oracle.com
[R1] Industrial Security 1.1.0 Fixes One Third-party Vulnerability - Security Advisory | Tenable® CONFIRM www.tenable.com
Red Hat Customer Portal REDHAT access.redhat.com
USN-3611-1: OpenSSL vulnerability | Ubuntu security notices | Ubuntu UBUNTU usn.ubuntu.com Third Party Advisory
OpenSSL Bugs Let Users Deny Service and Bypass Authentication in Certain Cases - SecurityTracker SECTRACK www.securitytracker.com Third Party Advisory, VDB Entry
git.openssl.org Git - openssl.git/commitdiff git.openssl.org
Red Hat Customer Portal REDHAT access.redhat.com
CPU Oct 2018 CONFIRM www.oracle.com
Debian -- Security Information -- DSA-4158-1 openssl1.0 DEBIAN www.debian.org Third Party Advisory
git.openssl.org Git - openssl.git/commitdiff CONFIRM git.openssl.org Patch, Vendor Advisory
git.openssl.org Git - openssl.git/commitdiff CONFIRM git.openssl.org Patch, Vendor Advisory
[R1] OpenSSL Stand-alone Patch Available for SecurityCenter versions 5.0 or Later - Security Advisory | Tenable® CONFIRM www.tenable.com
Oracle Critical Patch Update Advisory - April 2019 MISC www.oracle.com
CVE Program record CVE.ORG www.cve.org canonical
NVD vulnerability detail NVD nvd.nist.gov canonical, analysis

Vendor Comments And Credit

Discovery Credit

LEGACY: OSS-fuzz

Legacy QID Mappings

  • 296090 Oracle Solaris 11.4 Support Repository Update (SRU) 5.1.3 Missing (CPUJAN2019)
  • 390226 Oracle Managed Virtualization (VM) Server for x86 Security Update for Open Secure Sockets Layer (OpenSSL) (OVMSA-2021-0011)
  • 390284 Oracle Managed Virtualization (VM) Server for x86 Security Update for Open Secure Sockets Layer (OpenSSL) (OVMSA-2023-0013)
  • 43888 Huawei Router Open Secure Sockets Layer (OpenSSL) Vulnerability Vulnerability (Huawei-SA-20180613-01-openssl-en)
  • 591115 ABB Relion 670 series and Relion 650 series Open Secure Sockets Layer (OpenSSL) Multiple Vulnerabilities (ABBVU-PGGA-1MRG032388)
  • 670784 EulerOS Security Update for shim (EulerOS-SA-2021-2542)
  • 670808 EulerOS Security Update for shim (EulerOS-SA-2021-2566)
  • 690582 Free Berkeley Software Distribution (FreeBSD) Security Update for mysql (909be51b-9b3b-11e8-add2-b499baebfeaf)
  • 710214 Gentoo Linux Open Secure Sockets Layer Multiple Vulnerabilities (GLSA 201811-21)
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report