CVE-2017-3735

NameCVE-2017-3735
DescriptionWhile parsing an IPAddressFamily extension in an X.509 certificate, it is possible to do a one-byte overread. This would result in an incorrect text display of the certificate. This bug has been present since 2006 and is present in all versions of OpenSSL before 1.0.2m and 1.1.0g.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SuSE, Mageia, GitHub code/issues, web search, more)
ReferencesDLA-1157-1, DSA-4017-1, DSA-4018-1
NVD severitymedium (attack range: remote)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
openssl (PTS)wheezy1.0.1e-2+deb7u20vulnerable
wheezy (security)1.0.1t-1+deb7u3fixed
jessie1.0.1t-1+deb8u6vulnerable
jessie (security)1.0.1t-1+deb8u7fixed
stretch1.1.0f-3vulnerable
stretch (security)1.1.0f-3+deb9u1fixed
buster, sid1.1.0g-2fixed
openssl1.0 (PTS)stretch1.0.2l-2vulnerable
stretch (security)1.0.2l-2+deb9u1fixed
buster, sid1.0.2m-3fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
opensslsource(unstable)1.1.0g-1medium
opensslsourcejessie1.0.1t-1+deb8u7mediumDSA-4018-1
opensslsourcestretch1.1.0f-3+deb9u1mediumDSA-4018-1
opensslsourcewheezy1.0.1t-1+deb7u3mediumDLA-1157-1
openssl1.0source(unstable)1.0.2m-1medium
openssl1.0sourcestretch1.0.2l-2+deb9u1mediumDSA-4017-1

Notes

Fix for 1.0.2: https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=31c8b265591a0aaa462a1f3eb5770661aaac67db
Fix for 1.1.0: https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=068b963bb7afc57f5bdd723de0dd15e7795d5822

Search for package or bug name: Reporting problems