CVE-2017-3735

NameCVE-2017-3735
DescriptionWhile parsing an IPAddressFamily extension in an X.509 certificate, it is possible to do a one-byte overread. This would result in an incorrect text display of the certificate. This bug has been present since 2006 and is present in all versions of OpenSSL since then.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SuSE, Mageia, GitHub code/issues, web search, more)
NVD severitymedium (attack range: remote)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
openssl (PTS)wheezy1.0.1e-2+deb7u20vulnerable
wheezy (security)1.0.1t-1+deb7u2vulnerable
jessie (security), jessie1.0.1t-1+deb8u6vulnerable
stretch1.1.0f-3vulnerable
buster, sid1.1.0f-5vulnerable
openssl1.0 (PTS)buster, sid, stretch1.0.2l-2vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
opensslsource(unstable)(unfixed)medium
openssl1.0source(unstable)(unfixed)medium

Notes

[stretch] - openssl <postponed> (Can be fixed with the next openssl security release)
[jessie] - openssl <postponed> (Can be fixed with the next openssl security release)
[wheezy] - openssl <postponed> (Can be fixed with the next openssl security release)
[stretch] - openssl1.0 <postponed> (Can be fixed with the next openssl security release)
Fix for 1.0.2: https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=31c8b265591a0aaa462a1f3eb5770661aaac67db
Fix for 1.1.0: https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=068b963bb7afc57f5bdd723de0dd15e7795d5822

Search for package or bug name: Reporting problems