CVE-2018-0739
Published: 27 March 2018
Constructed ASN.1 types with a recursive definition (such as can be found in PKCS7) could eventually exceed the stack given malicious input with excessive recursion. This could result in a Denial Of Service attack. There are no such structures used within SSL/TLS that come from untrusted sources so this is considered safe. Fixed in OpenSSL 1.1.0h (Affected 1.1.0-1.1.0g). Fixed in OpenSSL 1.0.2o (Affected 1.0.2b-1.0.2n).
Priority
Status
Package | Release | Status |
---|---|---|
openssl
Launchpad, Ubuntu, Debian |
artful |
Released
(1.0.2g-1ubuntu13.4)
|
bionic |
Released
(1.1.0g-2ubuntu3)
|
|
cosmic |
Released
(1.1.0g-2ubuntu3)
|
|
disco |
Released
(1.1.0g-2ubuntu3)
|
|
trusty |
Released
(1.0.1f-1ubuntu2.24)
|
|
upstream |
Released
(1.0.2o,1.1.0h)
|
|
xenial |
Released
(1.0.2g-1ubuntu4.11)
|
|
Patches:
upstream: https://git.openssl.org/?p=openssl.git;a=commit;h=9310d45087ae546e27e61ddf8f6367f29848220d upstream: https://git.openssl.org/?p=openssl.git;a=commit;h=2ac4c6f7b2b2af20c0e2b0ba05367e454cd11b33 |
||
openssl098
Launchpad, Ubuntu, Debian |
artful |
Does not exist
|
bionic |
Does not exist
|
|
cosmic |
Does not exist
|
|
disco |
Does not exist
|
|
trusty |
Does not exist
(trusty was needed)
|
|
upstream |
Needs triage
|
|
xenial |
Does not exist
|
|
openssl1.0
Launchpad, Ubuntu, Debian |
artful |
Does not exist
|
bionic |
Released
(1.0.2n-1ubuntu5)
|
|
cosmic |
Released
(1.0.2n-1ubuntu5)
|
|
disco |
Does not exist
|
|
trusty |
Does not exist
|
|
upstream |
Needs triage
|
|
xenial |
Does not exist
|
Severity score breakdown
Parameter | Value |
---|---|
Base score | 6.5 |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | Required |
Scope | Unchanged |
Confidentiality | None |
Integrity impact | None |
Availability impact | High |
Vector | CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H |