CVE-2017-3735

NameCVE-2017-3735
DescriptionWhile parsing an IPAddressFamily extension in an X.509 certificate, it is possible to do a one-byte overread. This would result in an incorrect text display of the certificate. This bug has been present since 2006 and is present in all versions of OpenSSL before 1.0.2m and 1.1.0g.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
ReferencesDLA-1157-1, DSA-4017-1, DSA-4018-1
NVD severitymedium (attack range: remote)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
openssl (PTS)jessie1.0.1t-1+deb8u8fixed
jessie (security)1.0.1t-1+deb8u9fixed
stretch (security), stretch1.1.0f-3+deb9u2fixed
buster, sid1.1.0h-4fixed
openssl1.0 (PTS)stretch (security), stretch1.0.2l-2+deb9u3fixed
buster, sid1.0.2o-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
opensslsource(unstable)1.1.0g-1medium
opensslsourcejessie1.0.1t-1+deb8u7mediumDSA-4018-1
opensslsourcestretch1.1.0f-3+deb9u1mediumDSA-4018-1
opensslsourcewheezy1.0.1t-1+deb7u3mediumDLA-1157-1
openssl1.0source(unstable)1.0.2m-1medium
openssl1.0sourcestretch1.0.2l-2+deb9u1mediumDSA-4017-1

Notes

Fix for 1.0.2: https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=31c8b265591a0aaa462a1f3eb5770661aaac67db
Fix for 1.1.0: https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=068b963bb7afc57f5bdd723de0dd15e7795d5822

Search for package or bug name: Reporting problems