Out-of-Bounds Affecting openssl package, versions >=1.0.200, <1.0.211 >=1.0.204.1, <1.0.205
Snyk CVSS
Attack Complexity
Low
Threat Intelligence
EPSS
4.95% (92nd
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-COCOAPODS-OPENSSL-471043
- published 2 Oct 2019
- disclosed 28 Aug 2017
- credit Unknown
Introduced: 28 Aug 2017
CVE-2017-3735 Open this link in a new tabHow to fix?
Upgrade OpenSSL
to version 1.0.211, 1.0.205 or higher.
Overview
OpenSSL is a SSL/TLS and Crypto toolkit. Deprecated in Mac OS and gone in iOS, this spec gives your project non-deprecated OpenSSL support.
Affected versions of this package are vulnerable to Out-of-Bounds. OpenSSL is vulnerable to buffer overreads. Attackers can cause a on-byte buffer overread by using a X.509 certificate with a malformed IPAddressFamily
extension, as a result the certificate would incorrectly be displayed in clear text.
References
- Apple Security Advisory
- CONFIRM
- CONFIRM
- Debian Security Advisory
- Debian Security Advisory
- Debian Security Announcement
- FREEBSD
- Gentoo Security Advisory
- GitHub Commit
- Netapp Security Advisory
- Netapp Security Advisory
- OpenSSL Security Advisory
- OpenSSL Security Advisory
- Oracle Security Advisory
- Oracle Security Advisory
- Oracle Security Advisory
- Oracle Security Advisory
- Oracle Security Advisory
- Oracle Security Advisory
- RHSA Security Advisory
- RHSA Security Advisory
- Security Focus
- Security Tracker
- Ubuntu Security Advisory