CVE-2017-3731

Source
https://nvd.nist.gov/vuln/detail/CVE-2017-3731
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2017-3731.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2017-3731
Related
Published
2017-05-04T19:29:00Z
Modified
2024-09-18T02:51:20.591705Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

If an SSL/TLS server or client is running on a 32-bit host, and a specific cipher is being used, then a truncated packet can cause that server or client to perform an out-of-bounds read, usually resulting in a crash. For OpenSSL 1.1.0, the crash can be triggered when using CHACHA20/POLY1305; users should upgrade to 1.1.0d. For Openssl 1.0.2, the crash can be triggered when using RC4-MD5; users who have not disabled that algorithm should update to 1.0.2k.

References

Affected packages

Alpine:v3.2 / openssl

Package

Name
openssl
Purl
pkg:apk/alpine/openssl?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.0.2k-r0

Affected versions

0.*

0.9.8i-r0
0.9.8j-r0
0.9.8k-r0
0.9.8k-r1
0.9.8k-r2
0.9.8k-r3
0.9.8k-r4
0.9.8k-r5
0.9.8k-r6
0.9.8k-r7
0.9.8l-r0
0.9.8l-r1
0.9.8m-r0
0.9.8n-r0
0.9.8n-r1

1.*

1.0.0-r0
1.0.0a-r0
1.0.0a-r1
1.0.0a-r2
1.0.0a-r3
1.0.0a-r4
1.0.0b-r0
1.0.0c-r0
1.0.0d-r0
1.0.0e-r0
1.0.0f-r0
1.0.0g-r0
1.0.0h-r0
1.0.1-r0
1.0.1a-r0
1.0.1b-r0
1.0.1c-r0
1.0.1c-r1
1.0.1c-r2
1.0.1c-r3
1.0.1d-r0
1.0.1d-r1
1.0.1e-r0
1.0.1e-r1
1.0.1e-r2
1.0.1e-r3
1.0.1e-r4
1.0.1e-r5
1.0.1e-r6
1.0.1e-r7
1.0.1f-r0
1.0.1g-r0
1.0.1g-r1
1.0.1g-r2
1.0.1g-r3
1.0.1h-r0
1.0.1i-r0
1.0.1i-r1
1.0.1i-r2
1.0.1i-r3
1.0.1j-r0
1.0.1k-r0
1.0.1l-r0
1.0.2-r0
1.0.2a-r0
1.0.2a-r1
1.0.2b-r0
1.0.2c-r0
1.0.2d-r0
1.0.2e-r0
1.0.2f-r0
1.0.2g-r0
1.0.2h-r0
1.0.2h-r1
1.0.2h-r2
1.0.2h-r3
1.0.2h-r4
1.0.2i-r0
1.0.2j-r0

Alpine:v3.3 / openssl

Package

Name
openssl
Purl
pkg:apk/alpine/openssl?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.0.2k-r0

Affected versions

0.*

0.9.8i-r0
0.9.8j-r0
0.9.8k-r0
0.9.8k-r1
0.9.8k-r2
0.9.8k-r3
0.9.8k-r4
0.9.8k-r5
0.9.8k-r6
0.9.8k-r7
0.9.8l-r0
0.9.8l-r1
0.9.8m-r0
0.9.8n-r0
0.9.8n-r1

1.*

1.0.0-r0
1.0.0a-r0
1.0.0a-r1
1.0.0a-r2
1.0.0a-r3
1.0.0a-r4
1.0.0b-r0
1.0.0c-r0
1.0.0d-r0
1.0.0e-r0
1.0.0f-r0
1.0.0g-r0
1.0.0h-r0
1.0.1-r0
1.0.1a-r0
1.0.1b-r0
1.0.1c-r0
1.0.1c-r1
1.0.1c-r2
1.0.1c-r3
1.0.1d-r0
1.0.1d-r1
1.0.1e-r0
1.0.1e-r1
1.0.1e-r2
1.0.1e-r3
1.0.1e-r4
1.0.1e-r5
1.0.1e-r6
1.0.1e-r7
1.0.1f-r0
1.0.1g-r0
1.0.1g-r1
1.0.1g-r2
1.0.1g-r3
1.0.1h-r0
1.0.1i-r0
1.0.1i-r1
1.0.1i-r2
1.0.1i-r3
1.0.1j-r0
1.0.1k-r0
1.0.1l-r0
1.0.2-r0
1.0.2a-r0
1.0.2a-r1
1.0.2b-r0
1.0.2c-r0
1.0.2d-r0
1.0.2e-r0
1.0.2f-r0
1.0.2g-r0
1.0.2h-r0
1.0.2h-r1
1.0.2h-r2
1.0.2h-r3
1.0.2h-r4
1.0.2i-r0
1.0.2j-r0

Alpine:v3.4 / openssl

Package

Name
openssl
Purl
pkg:apk/alpine/openssl?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.0.2k-r0

Affected versions

0.*

0.9.8i-r0
0.9.8j-r0
0.9.8k-r0
0.9.8k-r1
0.9.8k-r2
0.9.8k-r3
0.9.8k-r4
0.9.8k-r5
0.9.8k-r6
0.9.8k-r7
0.9.8l-r0
0.9.8l-r1
0.9.8m-r0
0.9.8n-r0
0.9.8n-r1

1.*

1.0.0-r0
1.0.0a-r0
1.0.0a-r1
1.0.0a-r2
1.0.0a-r3
1.0.0a-r4
1.0.0b-r0
1.0.0c-r0
1.0.0d-r0
1.0.0e-r0
1.0.0f-r0
1.0.0g-r0
1.0.0h-r0
1.0.1-r0
1.0.1a-r0
1.0.1b-r0
1.0.1c-r0
1.0.1c-r1
1.0.1c-r2
1.0.1c-r3
1.0.1d-r0
1.0.1d-r1
1.0.1e-r0
1.0.1e-r1
1.0.1e-r2
1.0.1e-r3
1.0.1e-r4
1.0.1e-r5
1.0.1e-r6
1.0.1e-r7
1.0.1f-r0
1.0.1g-r0
1.0.1g-r1
1.0.1g-r2
1.0.1g-r3
1.0.1h-r0
1.0.1i-r0
1.0.1i-r1
1.0.1i-r2
1.0.1i-r3
1.0.1j-r0
1.0.1k-r0
1.0.1l-r0
1.0.2-r0
1.0.2a-r0
1.0.2a-r1
1.0.2b-r0
1.0.2c-r0
1.0.2d-r0
1.0.2e-r0
1.0.2e-r1
1.0.2f-r0
1.0.2f-r1
1.0.2f-r2
1.0.2g-r0
1.0.2g-r1
1.0.2g-r2
1.0.2g-r3
1.0.2h-r0
1.0.2h-r1
1.0.2h-r2
1.0.2h-r3
1.0.2h-r4
1.0.2i-r0
1.0.2j-r0

Debian:11 / openssl

Package

Name
openssl
Purl
pkg:deb/debian/openssl?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.1.0d-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / openssl

Package

Name
openssl
Purl
pkg:deb/debian/openssl?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.1.0d-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / openssl

Package

Name
openssl
Purl
pkg:deb/debian/openssl?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.1.0d-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Git / github.com/nodejs/node

Affected ranges

Type
GIT
Repo
https://github.com/nodejs/node
Events
Type
GIT
Repo
https://github.com/openssl/openssl
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

Other

BEFORE_engine
OpenSSL_0_9_1c
OpenSSL_0_9_2b
OpenSSL_0_9_3
OpenSSL_0_9_3a
OpenSSL_0_9_3beta2
OpenSSL_0_9_4
OpenSSL_0_9_5a
OpenSSL_0_9_5a-beta1
OpenSSL_0_9_5a-beta2
OpenSSL_0_9_5beta1
OpenSSL_0_9_5beta2
OpenSSL_0_9_6-beta3
OpenSSL_1_1_0
OpenSSL_1_1_0-pre1
OpenSSL_1_1_0-pre2
OpenSSL_1_1_0-pre3
OpenSSL_1_1_0-pre4
OpenSSL_1_1_0-pre5
OpenSSL_1_1_0-pre6
OpenSSL_1_1_0a
OpenSSL_1_1_0b
OpenSSL_1_1_0c
master-post-auto-reformat
master-post-reformat
master-pre-auto-reformat
master-pre-reformat

v4.*

v4.2.0
v4.2.1
v4.2.2
v4.2.3
v4.2.4
v4.2.5
v4.2.6
v4.3.0
v4.3.1
v4.3.2
v4.4.0
v4.4.1
v4.4.2
v4.4.3
v4.4.4
v4.4.5
v4.4.6
v4.4.7
v4.5.0
v4.6.0
v4.6.1
v4.6.2
v4.7.0
v4.7.1
v4.7.2