QID 38837
Date Published: 2021-03-26
QID 38837: OpenSSL Security Update (OpenSSL Security Advisory 20210325)
An OpenSSL TLS server may crash if sent a maliciously crafted renegotiation ClientHello message from a client. If a TLSv1.2 renegotiation ClientHello omits the signature_algorithms extension (where it was present in the initial ClientHello), but includes a signature_algorithms_cert extension then a NULL pointer dereference will result, leading to a crash and a denial of service attack. A server is only vulnerable if it has TLSv1.2 and renegotiation enabled (which is the default configuration). OpenSSL TLS clients are not impacted by this issue.
Affected Versions:
OpenSSL version 1.1.1-1.1.1j
NOTE:
OpenSSL 1.1.0 is out of support and no longer receiving updates of any kind. The impact of these issues on OpenSSL 1.1.0 has not been analysed.
OpenSSL 1.0.2 is not impacted by this issue.
QID Detection Logic:(Unauthenticated)
This QID matches vulnerable versions based on the exposed banner information.
Successful exploitation of the vulnerability enables untrusted users to modify OpenSSL's default configuration, insert CA certificates, modify (or even replace) existing engine modules, etc.
- OpenSSL Security Advisory 20210325 -
www.openssl.org/news/secadv/20210325.txt
CVEs related to QID 38837
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| 20210325 |
|