Out-of-Bounds Affecting openssl Open this link in a new tab package, versions >=1.0.200, <1.0.211 >=1.0.204.1, <1.0.205
Attack Complexity
Low
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications-
snyk-id
SNYK-COCOAPODS-OPENSSL-471043
-
published
2 Oct 2019
-
disclosed
28 Aug 2017
-
credit
Unknown
Introduced: 28 Aug 2017
CVE-2017-3735 Open this link in a new tabHow to fix?
Upgrade OpenSSL
to version 1.0.211, 1.0.205 or higher.
Overview
OpenSSL is a SSL/TLS and Crypto toolkit. Deprecated in Mac OS and gone in iOS, this spec gives your project non-deprecated OpenSSL support.
Affected versions of this package are vulnerable to Out-of-Bounds. OpenSSL is vulnerable to buffer overreads. Attackers can cause a on-byte buffer overread by using a X.509 certificate with a malformed IPAddressFamily
extension, as a result the certificate would incorrectly be displayed in clear text.
References
- Apple Security Advisory
- CONFIRM
- CONFIRM
- Debian Security Advisory
- Debian Security Advisory
- Debian Security Announcement
- FREEBSD
- Gentoo Security Advisory
- GitHub Commit
- Netapp Security Advisory
- Netapp Security Advisory
- OpenSSL Security Advisory
- OpenSSL Security Advisory
- Oracle Security Advisory
- Oracle Security Advisory
- Oracle Security Advisory
- Oracle Security Advisory
- Oracle Security Advisory
- Oracle Security Advisory
- RHSA Security Advisory
- RHSA Security Advisory
- Security Focus
- Security Tracker
- Ubuntu Security Advisory