CVE-2021-3449
Published: 25 March 2021
An OpenSSL TLS server may crash if sent a maliciously crafted renegotiation ClientHello message from a client. If a TLSv1.2 renegotiation ClientHello omits the signature_algorithms extension (where it was present in the initial ClientHello), but includes a signature_algorithms_cert extension then a NULL pointer dereference will result, leading to a crash and a denial of service attack. A server is only vulnerable if it has TLSv1.2 and renegotiation enabled (which is the default configuration). OpenSSL TLS clients are not impacted by this issue. All OpenSSL 1.1.1 versions are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1-1.1.1j).
CVSS 3 base score: 5.9
Status
Package | Release | Status |
---|---|---|
edk2 Launchpad, Ubuntu, Debian |
Upstream |
Not vulnerable
|
Ubuntu 21.04 (Hirsute Hippo) |
Not vulnerable
|
|
Ubuntu 20.10 (Groovy Gorilla) |
Not vulnerable
|
|
Ubuntu 20.04 LTS (Focal Fossa) |
Not vulnerable
|
|
Ubuntu 18.04 LTS (Bionic Beaver) |
Not vulnerable
|
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Not vulnerable
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
|
|
nodejs Launchpad, Ubuntu, Debian |
Upstream |
Needs triage
|
Ubuntu 21.04 (Hirsute Hippo) |
Not vulnerable
(uses system openssl1.1)
|
|
Ubuntu 20.10 (Groovy Gorilla) |
Not vulnerable
(uses system openssl1.1)
|
|
Ubuntu 20.04 LTS (Focal Fossa) |
Not vulnerable
(uses system openssl1.1)
|
|
Ubuntu 18.04 LTS (Bionic Beaver) |
Not vulnerable
(uses system openssl1.0)
|
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Not vulnerable
(uses system openssl)
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Not vulnerable
(uses system openssl)
|
|
openssl Launchpad, Ubuntu, Debian |
Upstream |
Needs triage
|
Ubuntu 21.04 (Hirsute Hippo) |
Released
(1.1.1j-1ubuntu3)
|
|
Ubuntu 20.10 (Groovy Gorilla) |
Released
(1.1.1f-1ubuntu4.3)
|
|
Ubuntu 20.04 LTS (Focal Fossa) |
Released
(1.1.1f-1ubuntu2.3)
|
|
Ubuntu 18.04 LTS (Bionic Beaver) |
Released
(1.1.1-1ubuntu2.1~18.04.9)
|
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Not vulnerable
(1.0.2g-1ubuntu4.19)
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Not vulnerable
|
|
openssl1.0 Launchpad, Ubuntu, Debian |
Upstream |
Needs triage
|
Ubuntu 21.04 (Hirsute Hippo) |
Does not exist
|
|
Ubuntu 20.10 (Groovy Gorilla) |
Does not exist
|
|
Ubuntu 20.04 LTS (Focal Fossa) |
Does not exist
|
|
Ubuntu 18.04 LTS (Bionic Beaver) |
Not vulnerable
(1.0.2n-1ubuntu5.6)
|
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Does not exist
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
|
Notes
Author | Note |
---|---|
mdeslaur | does not affect 1.0.2 edk2 doesn't implement a server, so not vulnerable to this issue |