NULL Pointer Dereference Affecting openssl-src package, versions <111.6.0+1.1.1d


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Mature
EPSS
8.1% (95th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about NULL Pointer Dereference vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-RUST-OPENSSLSRC-570477
  • published22 Apr 2020
  • disclosed21 Apr 2020
  • creditBernd Edlinger

Introduced: 21 Apr 2020

CVE-2020-1967  (opens in a new tab)
CWE-476  (opens in a new tab)

How to fix?

Upgrade openssl-src to version 111.6.0+1.1.1d or higher.

Overview

openssl-src is a crate that contains the logic to build OpenSSL and is intended to be consumed by the openssl-sys crate.

Affected versions of this package are vulnerable to NULL Pointer Dereference. A NULL pointer dereference flaw was found in the way OpenSSL handled certain TLS handshake messages. This flaw allows an unauthenticated attacker to cause a server application compiled with OpenSSL to crash, causing a denial of service. In some cases a malicious server could also cause a client compiled with OpenSSL to crash.

CVSS Scores

version 3.1