ID

VAR-201708-1311


CVE

CVE-2017-3735


TITLE

OpenSSL Vulnerabilities in incorrect certificate text

Trust: 0.8

sources: JVNDB: JVNDB-2017-007691

DESCRIPTION

While parsing an IPAddressFamily extension in an X.509 certificate, it is possible to do a one-byte overread. This would result in an incorrect text display of the certificate. This bug has been present since 2006 and is present in all versions of OpenSSL before 1.0.2m and 1.1.0g. OpenSSL is prone to a security-bypass vulnerability. Successfully exploiting this issue will allow attackers to bypass security restrictions and perform unauthorized actions; this may aid in launching further attacks. Summary: Security Advisory 2. Description: Red Hat Ansible Tower 3.3.1 is now available and contains the following bug fixes: - - Fixed event callback error when in-line vaulted variables are used with ``include_vars`` - - Fixed HSTS and X-Frame-Options to properly be set in nginx configuration - - Fixed isolated node setup to no longer fail when ``ansible_host`` is used - - Fixed selection of custom virtual environments in job template creation - - Fixed websockets for job details to properly work - - Fixed the ``/api/v2/authtoken`` compatibility shim - - Fixed page size selection on the jobs screen - - Fixed instances in an instance group to properly be disabled in the user interface - - Fixed the job template selection in workflow creation to properly render - - Fixed ``member_attr`` to properly set on some LDAP configurations during upgrade, preventing login - - Fixed ``PosixUIDGroupType`` LDAP configurations - - Improved the RAM requirement in the installer preflight check - - Updated Tower to properly report an error when relaunch was used on a set of failed hosts that is too large - - Updated sosreport configuration to gather more python environment, nginx, and supervisor configuration - - Fixed display of extra_vars for scheduled jobs 3. Solution: The Ansible Tower Upgrade and Migration Guide is available at: https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/ index.html 4. ========================================================================== Ubuntu Security Notice USN-3611-2 April 17, 2018 openssl vulnerabilities ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 12.04 ESM Summary: Several security issues were fixed in OpenSSL. This update provides the corresponding update for Ubuntu 12.04 ESM. (CVE-2017-3735) It was discovered that OpenSSL incorrectly handled certain ASN.1 types. A remote attacker could possibly use this issue to cause a denial of service. (CVE-2018-0739) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 12.04 ESM: libssl1.0.0 1.0.1-4ubuntu5.40 openssl 1.0.1-4ubuntu5.40 After a standard system update you need to reboot your computer to make all the necessary changes. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 APPLE-SA-2017-12-6-1 macOS High Sierra 10.13.2, Security Update 2017-002 Sierra, and Security Update 2017-005 El Capitan macOS High Sierra 10.13.2, Security Update 2017-002 Sierra, and Security Update 2017-005 El Capitan are now available and address the following: apache Available for: macOS High Sierra 10.13.1, macOS Sierra 10.12.6, OS X El Capitan 10.11.6 Impact: Processing a maliciously crafted Apache configuration directive may result in the disclosure of process memory Description: Multiple issues were addressed by updating to version 2.4.28. CVE-2017-9798 curl Available for: macOS High Sierra 10.13.1, macOS Sierra 10.12.6, OS X El Capitan 10.11.6 Impact: Malicious FTP servers may be able to cause the client to read out-of-bounds memory Description: An out-of-bounds read issue existed in the FTP PWD response parsing. This issue was addressed with improved bounds checking. CVE-2017-1000254: Max Dymond Directory Utility Available for: macOS High Sierra 10.13 and macOS High Sierra 10.13.1 Not impacted: macOS Sierra 10.12.6 and earlier Impact: An attacker may be able to bypass administrator authentication without supplying the administrator's password Description: A logic error existed in the validation of credentials. This was addressed with improved credential validation. CVE-2017-13872 Intel Graphics Driver Available for: macOS High Sierra 10.13.1 Impact: An application may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue was addressed with improved memory handling. CVE-2017-13883: an anonymous researcher Intel Graphics Driver Available for: macOS High Sierra 10.13.1 Impact: A local user may be able to cause unexpected system termination or read kernel memory Description: An out-of-bounds read issue existed that led to the disclosure of kernel memory. This was addressed through improved input validation. CVE-2017-13878: Ian Beer of Google Project Zero Intel Graphics Driver Available for: macOS High Sierra 10.13.1 Impact: An application may be able to execute arbitrary code with system privileges Description: An out-of-bounds read was addressed through improved bounds checking. CVE-2017-13875: Ian Beer of Google Project Zero IOAcceleratorFamily Available for: macOS High Sierra 10.13.1, macOS Sierra 10.12.6, OS X El Capitan 10.11.6 Impact: An application may be able to execute arbitrary code with system privileges Description: A memory corruption issue was addressed with improved memory handling. CVE-2017-13844: found by IMF developed by HyungSeok Han (daramg.gift) of SoftSec, KAIST (softsec.kaist.ac.kr) IOKit Available for: macOS High Sierra 10.13.1 Impact: An application may be able to execute arbitrary code with system privileges Description: An input validation issue existed in the kernel. This issue was addressed through improved input validation. CVE-2017-13848: Alex Plaskett of MWR InfoSecurity CVE-2017-13858: an anonymous researcher IOKit Available for: macOS High Sierra 10.13.1, macOS Sierra 10.12.6, OS X El Capitan 10.11.6 Impact: An application may be able to execute arbitrary code with system privileges Description: Multiple memory corruption issues were addressed through improved state management. CVE-2017-13847: Ian Beer of Google Project Zero Kernel Available for: macOS High Sierra 10.13.1, macOS Sierra 10.12.6, OS X El Capitan 10.11.6 Impact: An application may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue was addressed with improved memory handling. CVE-2017-13862: Apple Kernel Available for: macOS High Sierra 10.13.1, macOS Sierra 10.12.6, OS X El Capitan 10.11.6 Impact: An application may be able to read restricted memory Description: An out-of-bounds read was addressed with improved bounds checking. CVE-2017-13833: Brandon Azad Kernel Available for: macOS High Sierra 10.13.1 Impact: An application may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue was addressed with improved memory handling. CVE-2017-13876: Ian Beer of Google Project Zero Kernel Available for: macOS High Sierra 10.13.1, macOS Sierra 10.12.6, OS X El Capitan 10.11.6 Impact: An application may be able to read restricted memory Description: A type confusion issue was addressed with improved memory handling. CVE-2017-13855: Jann Horn of Google Project Zero Kernel Available for: macOS High Sierra 10.13.1, macOS Sierra 10.12.6, OS X El Capitan 10.11.6 Impact: A malicious application may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue was addressed with improved memory handling. CVE-2017-13867: Ian Beer of Google Project Zero Kernel Available for: macOS High Sierra 10.13.1 Impact: An application may be able to read restricted memory Description: A validation issue was addressed with improved input sanitization. CVE-2017-13865: Ian Beer of Google Project Zero Kernel Available for: macOS High Sierra 10.13.1, macOS Sierra 10.12.6, OS X El Capitan 10.11.6 Impact: An application may be able to read restricted memory Description: A validation issue was addressed with improved input sanitization. CVE-2017-13868: Brandon Azad CVE-2017-13869: Jann Horn of Google Project Zero Mail Available for: macOS High Sierra 10.13.1 Impact: A S/MIME encrypted email may be inadvertently sent unencrypted if the receiver's S/MIME certificate is not installed Description: An inconsistent user interface issue was addressed with improved state management. CVE-2017-13871: an anonymous researcher Mail Drafts Available for: macOS High Sierra 10.13.1 Impact: An attacker with a privileged network position may be able to intercept mail Description: An encryption issue existed with S/MIME credetials. The issue was addressed with additional checks and user control. CVE-2017-13860: Michael Weishaar of INNEO Solutions GmbH OpenSSL Available for: macOS High Sierra 10.13.1, macOS Sierra 10.12.6, OS X El Capitan 10.11.6 Impact: An application may be able to read restricted memory Description: An out-of-bounds read issue existed in X.509 IPAddressFamily parsing. This issue was addressed with improved bounds checking. CVE-2017-3735: found by OSS-Fuzz Screen Sharing Server Available for: macOS High Sierra 10.13.1, macOS Sierra 10.12.6 Impact: A user with screen sharing access may be able to access any file readable by root Description: A permissions issue existed in the handling of screen sharing sessions. This issue was addressed with improved permissions handling. CVE-2017-13826: Trevor Jacques of Toronto Installation note: macOS High Sierra 10.13.2, Security Update 2017-002 Sierra, and Security Update 2017-005 El Capitan may be obtained from the Mac App Store or Apple's Software Downloads web site: https://support.apple.com/downloads/ Information will also be posted to the Apple Security Updates web site: https://support.apple.com/kb/HT201222 This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE----- iQJdBAEBCgBHFiEEcuX4rtoRe4X62yWlg6PvjDRstEYFAlooN9kpHHByb2R1Y3Qt c2VjdXJpdHktbm9yZXBseUBsaXN0cy5hcHBsZS5jb20ACgkQg6PvjDRstEbvlg/7 Bub6HL7Bv+9taMMz+3Rl2exjVIBv3fUflhpLh1524wFe6UjUyy4Z3X0t/LKogGwb GkHmcvDTK+85yLJeF0XQLHzzeITPrAiQ06FSnpzq6GjDEgczgbyJtw6aT4iagDgK NYfWnmU1XDjpx35kjEyyZblIxDHsvMJRelMdjx4w6In3Pgi+DG+ndYbK5hoaImOX Ywaoc2xzGUXpnJU6Y5tkIbVBF4P4tZQcJJt6cfhTOcR9+ut87HQqc9mo1UGMUqAv z0kYZ4MtGRM4uDiVynkKxwj+NNtSVxwvf1mN2Jb7ApFt0lAfmS8L8xzI15NlbJxJ oSuIvVi3pAhOkO7etaC/CLOxw+wRGaRbaf1i4VmaLI6HW2H2/vWiL1KDhHFIIfVq xBGday+yWkaS9o8B85QZy2GHxEFYxzMvArtzK3tBj2kZCuEcJis60CanwZOSbcsp 4IlEKVGabMNwGwOVX22UwrLCtMzsqSVZpYyKy/m7n6DXnpspuWTohDmc68zq/4nj 5LgGTFz8IUaT1ujQZq9g4siVeXzu0bsAgttauRlrWilUsDtpsv5s+dkGlXPFxbDf BuvNgqGSg/xz0QRGmJ7UA3g3L7fTvWhOzXnBOh7c45OpYT54tqGIEi6Bk72NyPz+ ioQ7LBPJE6RCSy5XZJ6x8YwSYp+kO8BBPaYsxSoxXCs= =2VBd -----END PGP SIGNATURE----- . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: openssl security, bug fix, and enhancement update Advisory ID: RHSA-2018:3221-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2018:3221 Issue date: 2018-10-30 CVE Names: CVE-2017-3735 CVE-2018-0495 CVE-2018-0732 CVE-2018-0737 CVE-2018-0739 ===================================================================== 1. Summary: An update for openssl is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Client (v. 7) - x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64 Red Hat Enterprise Linux Server (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64 Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7) - aarch64, ppc64le, s390x Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7) - aarch64, ppc64le, s390x 3. Description: OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library. Security Fix(es): * openssl: ROHNP - Key Extraction Side Channel in Multiple Crypto Libraries (CVE-2018-0495) * openssl: Malicious server can send large prime to client during DH(E) TLS handshake causing the client to hang (CVE-2018-0732) * openssl: Handling of crafted recursive ASN.1 structures can cause a stack overflow and resulting denial of service (CVE-2018-0739) * openssl: Malformed X.509 IPAdressFamily could cause OOB read (CVE-2017-3735) * openssl: RSA key generation cache timing vulnerability in crypto/rsa/rsa_gen.c allows attackers to recover private keys (CVE-2018-0737) For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Red Hat Enterprise Linux 7.6 Release Notes linked from the References section. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 For the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted. 5. Bugs fixed (https://bugzilla.redhat.com/): 1486144 - CVE-2017-3735 openssl: Malformed X.509 IPAdressFamily could cause OOB read 1548401 - modify X509_NAME comparison function to be case sensitive for CA name lists in SSL 1561266 - CVE-2018-0739 openssl: Handling of crafted recursive ASN.1 structures can cause a stack overflow and resulting denial of service 1568253 - CVE-2018-0737 openssl: RSA key generation cache timing vulnerability in crypto/rsa/rsa_gen.c allows attackers to recover private keys 1585004 - ppc64le opensslconf.h is incompatible with swig 1591100 - CVE-2018-0732 openssl: Malicious server can send large prime to client during DH(E) TLS handshake causing the client to hang 1591163 - CVE-2018-0495 openssl: ROHNP - Key Extraction Side Channel in Multiple Crypto Libraries 1603597 - Confusing error message when asking for invalid DSA parameter sizes in FIPS mode 6. Package List: Red Hat Enterprise Linux Client (v. 7): Source: openssl-1.0.2k-16.el7.src.rpm x86_64: openssl-1.0.2k-16.el7.x86_64.rpm openssl-debuginfo-1.0.2k-16.el7.i686.rpm openssl-debuginfo-1.0.2k-16.el7.x86_64.rpm openssl-libs-1.0.2k-16.el7.i686.rpm openssl-libs-1.0.2k-16.el7.x86_64.rpm Red Hat Enterprise Linux Client Optional (v. 7): x86_64: openssl-debuginfo-1.0.2k-16.el7.i686.rpm openssl-debuginfo-1.0.2k-16.el7.x86_64.rpm openssl-devel-1.0.2k-16.el7.i686.rpm openssl-devel-1.0.2k-16.el7.x86_64.rpm openssl-perl-1.0.2k-16.el7.x86_64.rpm openssl-static-1.0.2k-16.el7.i686.rpm openssl-static-1.0.2k-16.el7.x86_64.rpm Red Hat Enterprise Linux ComputeNode (v. 7): Source: openssl-1.0.2k-16.el7.src.rpm x86_64: openssl-1.0.2k-16.el7.x86_64.rpm openssl-debuginfo-1.0.2k-16.el7.i686.rpm openssl-debuginfo-1.0.2k-16.el7.x86_64.rpm openssl-libs-1.0.2k-16.el7.i686.rpm openssl-libs-1.0.2k-16.el7.x86_64.rpm Red Hat Enterprise Linux ComputeNode Optional (v. 7): x86_64: openssl-debuginfo-1.0.2k-16.el7.i686.rpm openssl-debuginfo-1.0.2k-16.el7.x86_64.rpm openssl-devel-1.0.2k-16.el7.i686.rpm openssl-devel-1.0.2k-16.el7.x86_64.rpm openssl-perl-1.0.2k-16.el7.x86_64.rpm openssl-static-1.0.2k-16.el7.i686.rpm openssl-static-1.0.2k-16.el7.x86_64.rpm Red Hat Enterprise Linux Server (v. 7): Source: openssl-1.0.2k-16.el7.src.rpm ppc64: openssl-1.0.2k-16.el7.ppc64.rpm openssl-debuginfo-1.0.2k-16.el7.ppc.rpm openssl-debuginfo-1.0.2k-16.el7.ppc64.rpm openssl-devel-1.0.2k-16.el7.ppc.rpm openssl-devel-1.0.2k-16.el7.ppc64.rpm openssl-libs-1.0.2k-16.el7.ppc.rpm openssl-libs-1.0.2k-16.el7.ppc64.rpm ppc64le: openssl-1.0.2k-16.el7.ppc64le.rpm openssl-debuginfo-1.0.2k-16.el7.ppc64le.rpm openssl-devel-1.0.2k-16.el7.ppc64le.rpm openssl-libs-1.0.2k-16.el7.ppc64le.rpm s390x: openssl-1.0.2k-16.el7.s390x.rpm openssl-debuginfo-1.0.2k-16.el7.s390.rpm openssl-debuginfo-1.0.2k-16.el7.s390x.rpm openssl-devel-1.0.2k-16.el7.s390.rpm openssl-devel-1.0.2k-16.el7.s390x.rpm openssl-libs-1.0.2k-16.el7.s390.rpm openssl-libs-1.0.2k-16.el7.s390x.rpm x86_64: openssl-1.0.2k-16.el7.x86_64.rpm openssl-debuginfo-1.0.2k-16.el7.i686.rpm openssl-debuginfo-1.0.2k-16.el7.x86_64.rpm openssl-devel-1.0.2k-16.el7.i686.rpm openssl-devel-1.0.2k-16.el7.x86_64.rpm openssl-libs-1.0.2k-16.el7.i686.rpm openssl-libs-1.0.2k-16.el7.x86_64.rpm Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7): Source: openssl-1.0.2k-16.el7.src.rpm aarch64: openssl-1.0.2k-16.el7.aarch64.rpm openssl-debuginfo-1.0.2k-16.el7.aarch64.rpm openssl-devel-1.0.2k-16.el7.aarch64.rpm openssl-libs-1.0.2k-16.el7.aarch64.rpm ppc64le: openssl-1.0.2k-16.el7.ppc64le.rpm openssl-debuginfo-1.0.2k-16.el7.ppc64le.rpm openssl-devel-1.0.2k-16.el7.ppc64le.rpm openssl-libs-1.0.2k-16.el7.ppc64le.rpm s390x: openssl-1.0.2k-16.el7.s390x.rpm openssl-debuginfo-1.0.2k-16.el7.s390.rpm openssl-debuginfo-1.0.2k-16.el7.s390x.rpm openssl-devel-1.0.2k-16.el7.s390.rpm openssl-devel-1.0.2k-16.el7.s390x.rpm openssl-libs-1.0.2k-16.el7.s390.rpm openssl-libs-1.0.2k-16.el7.s390x.rpm Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7): aarch64: openssl-debuginfo-1.0.2k-16.el7.aarch64.rpm openssl-perl-1.0.2k-16.el7.aarch64.rpm openssl-static-1.0.2k-16.el7.aarch64.rpm ppc64le: openssl-debuginfo-1.0.2k-16.el7.ppc64le.rpm openssl-perl-1.0.2k-16.el7.ppc64le.rpm openssl-static-1.0.2k-16.el7.ppc64le.rpm s390x: openssl-debuginfo-1.0.2k-16.el7.s390.rpm openssl-debuginfo-1.0.2k-16.el7.s390x.rpm openssl-perl-1.0.2k-16.el7.s390x.rpm openssl-static-1.0.2k-16.el7.s390.rpm openssl-static-1.0.2k-16.el7.s390x.rpm Red Hat Enterprise Linux Server Optional (v. 7): ppc64: openssl-debuginfo-1.0.2k-16.el7.ppc.rpm openssl-debuginfo-1.0.2k-16.el7.ppc64.rpm openssl-perl-1.0.2k-16.el7.ppc64.rpm openssl-static-1.0.2k-16.el7.ppc.rpm openssl-static-1.0.2k-16.el7.ppc64.rpm ppc64le: openssl-debuginfo-1.0.2k-16.el7.ppc64le.rpm openssl-perl-1.0.2k-16.el7.ppc64le.rpm openssl-static-1.0.2k-16.el7.ppc64le.rpm s390x: openssl-debuginfo-1.0.2k-16.el7.s390.rpm openssl-debuginfo-1.0.2k-16.el7.s390x.rpm openssl-perl-1.0.2k-16.el7.s390x.rpm openssl-static-1.0.2k-16.el7.s390.rpm openssl-static-1.0.2k-16.el7.s390x.rpm x86_64: openssl-debuginfo-1.0.2k-16.el7.i686.rpm openssl-debuginfo-1.0.2k-16.el7.x86_64.rpm openssl-perl-1.0.2k-16.el7.x86_64.rpm openssl-static-1.0.2k-16.el7.i686.rpm openssl-static-1.0.2k-16.el7.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 7): Source: openssl-1.0.2k-16.el7.src.rpm x86_64: openssl-1.0.2k-16.el7.x86_64.rpm openssl-debuginfo-1.0.2k-16.el7.i686.rpm openssl-debuginfo-1.0.2k-16.el7.x86_64.rpm openssl-devel-1.0.2k-16.el7.i686.rpm openssl-devel-1.0.2k-16.el7.x86_64.rpm openssl-libs-1.0.2k-16.el7.i686.rpm openssl-libs-1.0.2k-16.el7.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 7): x86_64: openssl-debuginfo-1.0.2k-16.el7.i686.rpm openssl-debuginfo-1.0.2k-16.el7.x86_64.rpm openssl-perl-1.0.2k-16.el7.x86_64.rpm openssl-static-1.0.2k-16.el7.i686.rpm openssl-static-1.0.2k-16.el7.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2017-3735 https://access.redhat.com/security/cve/CVE-2018-0495 https://access.redhat.com/security/cve/CVE-2018-0732 https://access.redhat.com/security/cve/CVE-2018-0737 https://access.redhat.com/security/cve/CVE-2018-0739 https://access.redhat.com/security/updates/classification/#moderate https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/7.6_release_notes/index 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2018 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBW9gQkdzjgjWX9erEAQgQZQ/8CfvagNmJ9p3eWlbk5NOClhF4mxZjzHUc j8kOWrBXKt+VsCknJJTwKOkzrljUJ/XgHo4vu/G9F6O3Oj62roWmW5OJKtlmD3xl VOhUNNmWalVsQ1i1CgI7Khf2Xq9SaMnCaTDpoTamAAznrcj7T2AGABIzPeK0+WL7 GctOtuZoC04CSUbg4z3I6KWYZAh9Id6qbYLcMYSNbTGW7FKl15GOQsu2atwwoWhg 9BA6QhEULWiob/MWcGIrZZl3Bqm2cngC+FhxklsWJ9BC0zRsCJZROBg2eYVCwW78 ZwXiS5rQCSNkmGO4GK239aSyjMmtwrZBzfLsFXz1Enp7kKle6EqnA655p4cu78I8 HXxmBOceOq7NlG3Zz4PKafmkqZMHoriIxGDgGYWxMBb2Tdk7ZerhsaA1fW9dDPIZ zNxF0LngoaZbu49DKv/Doiqcs9nsyvoYpBMeALAM1hAZRhk7o31HJS9i7O/YzuWc uL7wgtQRgyxtFXaRlleWU8pWsTx9NtpvtPiMJQzkw19UX3El5DQv+8x+hNholuZa pfA9UWrhLfYVk0ZZRzI9pYgpsEJ9Ga3TgykpM048V4+84KVDRkkLHxGM1p3rvX01 eCRYyB0VzbFhKwxdyRniBITh3e2+uaYkG7zYSX+ewXu2rOTN8uLrK87rHDliQnvS nuWE/iwTIDU= =jMog -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . This issue only applied to Ubuntu 16.04 LTS, Ubuntu 16.10 and Ubuntu 17.04. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201712-03 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - https://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: Normal Title: OpenSSL: Multiple vulnerabilities Date: December 14, 2017 Bugs: #629290, #636264, #640172 ID: 201712-03 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======== Multiple vulnerabilities have been found in OpenSSL, the worst of which may lead to a Denial of Service condition. Affected packages ================= ------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 dev-libs/openssl < 1.0.2n >= 1.0.2n Description =========== Multiple vulnerabilities have been discovered in OpenSSL. Please review the referenced CVE identifiers for details. Impact ====== A remote attacker could cause a Denial of Service condition, recover a private key in unlikely circumstances, circumvent security restrictions to perform unauthorized actions, or gain access to sensitive information. Workaround ========== There are no known workarounds at this time. Resolution ========== All OpenSSL users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=dev-libs/openssl-1.0.2n" References ========== [ 1 ] CVE-2017-3735 https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3735 [ 2 ] CVE-2017-3736 https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3736 [ 3 ] CVE-2017-3737 https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3737 [ 4 ] CVE-2017-3738 https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3738 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: https://security.gentoo.org/glsa/201712-03 Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ======= Copyright 2017 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. http://creativecommons.org/licenses/by-sa/2.5 --IrEhWFjxIJsFtqH1v1HHQsLm3nLmhNeP4--

Trust: 2.52

sources: NVD: CVE-2017-3735 // JVNDB: JVNDB-2017-007691 // BID: 100515 // VULMON: CVE-2017-3735 // PACKETSTORM: 150193 // PACKETSTORM: 147233 // PACKETSTORM: 145270 // PACKETSTORM: 150049 // PACKETSTORM: 144899 // PACKETSTORM: 145423

AFFECTED PRODUCTS

vendor:debianmodel:linuxscope:eqversion:9.0

Trust: 1.6

vendor:debianmodel:linuxscope:eqversion:8.0

Trust: 1.6

vendor:opensslmodel:opensslscope:eqversion:0.9.8ze

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:1.1.0b

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.8u

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.8l

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.7m

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:1.0.2d

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:1.0.0c

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.8y

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:1.1.0f

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.8e

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.8r

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:1.0.0i

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.8zc

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:1.0.0j

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:1.0.1k

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:1.1.0a

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.8k

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.8m

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:1.0.0l

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:1.1.0d

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:1.0.2k

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:1.0.1g

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.8a

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.8z

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:1.0.0p

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:1.0.0o

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.8f

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:1.0.1b

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:1.0.0m

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:1.0.0k

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.8w

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.8p

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.8c

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:1.0.0a

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:1.0.1a

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:1.0.0

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:1.0.1

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.8

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:1.0.1c

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:1.0.2h

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:1.1.0

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:1.0.2f

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:1.0.1h

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.8n

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.8b

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:1.0.0q

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:1.0.2i

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:1.0.2

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.8d

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.8za

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:1.1.0e

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:1.0.1d

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:1.0.0b

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:1.0.2c

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.8j

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.8s

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:1.0.2e

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:1.0.0r

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:1.0.0e

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.8zb

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.8q

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:1.0.2j

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:1.0.1e

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:1.0.0d

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:1.0.2a

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:1.0.0s

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.7l

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.8x

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:1.0.1l

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:1.0.1f

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:1.0.1j

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.8g

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.8v

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:1.0.0h

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:1.1.0c

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.8zg

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.8o

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:1.0.0g

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:1.0.2b

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:1.0.0f

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.8h

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:1.0.0n

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.7j

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.8t

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:1.0.1i

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.7k

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:1.0.2l

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.8i

Trust: 1.0

vendor:opensslmodel:opensslscope: - version: -

Trust: 0.8

vendor:redhatmodel:rhev-m for serversscope:eqversion:0

Trust: 0.3

vendor:redhatmodel:jboss web serverscope:eqversion:3.0

Trust: 0.3

vendor:redhatmodel:jboss ewsscope:eqversion:2

Trust: 0.3

vendor:redhatmodel:jboss ewsscope:eqversion:1

Trust: 0.3

vendor:redhatmodel:jboss eapscope:eqversion:6

Trust: 0.3

vendor:redhatmodel:jboss eapscope:eqversion:5

Trust: 0.3

vendor:redhatmodel:jboss core servicesscope:eqversion:1

Trust: 0.3

vendor:redhatmodel:enterprise linuxscope:eqversion:7

Trust: 0.3

vendor:redhatmodel:enterprise linuxscope:eqversion:6

Trust: 0.3

vendor:redhatmodel:enterprise linuxscope:eqversion:5

Trust: 0.3

vendor:oraclemodel:e-business suitescope:eqversion:12.1.3

Trust: 0.3

vendor:opensslmodel:project opensslscope:eqversion:1.1

Trust: 0.3

vendor:opensslmodel:project openssl 1.1.0fscope: - version: -

Trust: 0.3

vendor:opensslmodel:project openssl 1.1.0escope: - version: -

Trust: 0.3

vendor:opensslmodel:project openssl 1.1.0dscope: - version: -

Trust: 0.3

vendor:opensslmodel:project openssl 1.1.0cscope: - version: -

Trust: 0.3

vendor:opensslmodel:project openssl 1.1.0bscope: - version: -

Trust: 0.3

vendor:opensslmodel:project openssl 1.1.0ascope: - version: -

Trust: 0.3

vendor:opensslmodel:project openssl 1.0.2lscope: - version: -

Trust: 0.3

vendor:opensslmodel:project openssl 1.0.2kscope: - version: -

Trust: 0.3

vendor:opensslmodel:project openssl 1.0.2jscope: - version: -

Trust: 0.3

vendor:opensslmodel:project openssl 1.0.2iscope: - version: -

Trust: 0.3

vendor:opensslmodel:project openssl 1.0.2hscope: - version: -

Trust: 0.3

vendor:opensslmodel:project openssl 1.0.2gscope: - version: -

Trust: 0.3

vendor:opensslmodel:project openssl 1.0.2fscope: - version: -

Trust: 0.3

vendor:opensslmodel:project openssl 1.0.2escope: - version: -

Trust: 0.3

vendor:opensslmodel:project openssl 1.0.2dscope: - version: -

Trust: 0.3

vendor:opensslmodel:project openssl 1.0.2cscope: - version: -

Trust: 0.3

vendor:opensslmodel:project openssl 1.0.2bscope: - version: -

Trust: 0.3

vendor:opensslmodel:project openssl 1.0.2ascope: - version: -

Trust: 0.3

vendor:mcafeemodel:web gatewayscope:eqversion:7.7

Trust: 0.3

vendor:mcafeemodel:web gatewayscope:eqversion:7.8.0.1

Trust: 0.3

vendor:mcafeemodel:web gatewayscope:eqversion:7.8

Trust: 0.3

vendor:mcafeemodel:web gatewayscope:eqversion:7.7.2.6

Trust: 0.3

vendor:mcafeemodel:web gatewayscope:eqversion:7.7.2.3

Trust: 0.3

vendor:mcafeemodel:web gatewayscope:eqversion:7.7.2.2

Trust: 0.3

vendor:mcafeemodel:web gatewayscope:eqversion:7.6.2.4

Trust: 0.3

vendor:mcafeemodel:web gatewayscope:eqversion:7.6.2.3

Trust: 0.3

vendor:mcafeemodel:web gatewayscope:eqversion:7.6.2.2

Trust: 0.3

vendor:mcafeemodel:web gatewayscope:eqversion:7.6.2.17

Trust: 0.3

vendor:mcafeemodel:web gatewayscope:eqversion:7.6.2.15

Trust: 0.3

vendor:mcafeemodel:web gatewayscope:eqversion:7.6.2.14

Trust: 0.3

vendor:mcafeemodel:web gatewayscope:eqversion:7.6.2.1

Trust: 0.3

vendor:mcafeemodel:web gatewayscope:eqversion:7.6.2.0

Trust: 0.3

vendor:ibmmodel:viosscope:eqversion:2.2

Trust: 0.3

vendor:ibmmodel:aixscope:eqversion:7.2

Trust: 0.3

vendor:ibmmodel:aixscope:eqversion:7.1

Trust: 0.3

vendor:ibmmodel:aixscope:eqversion:6.1

Trust: 0.3

vendor:ibmmodel:aixscope:eqversion:5.3

Trust: 0.3

vendor:bluecoatmodel:x-series xosscope:eqversion:9.7

Trust: 0.3

vendor:bluecoatmodel:x-series xosscope:eqversion:11.0

Trust: 0.3

vendor:bluecoatmodel:x-series xosscope:eqversion:10.0

Trust: 0.3

vendor:bluecoatmodel:unified agentscope:eqversion:4.9

Trust: 0.3

vendor:bluecoatmodel:unified agentscope:eqversion:4.8

Trust: 0.3

vendor:bluecoatmodel:unified agentscope:eqversion:4.7

Trust: 0.3

vendor:bluecoatmodel:unified agentscope:eqversion:4.6

Trust: 0.3

vendor:bluecoatmodel:unified agentscope:eqversion:4.1

Trust: 0.3

vendor:bluecoatmodel:ssl visibilityscope:eqversion:4.2

Trust: 0.3

vendor:bluecoatmodel:ssl visibilityscope:eqversion:4.1

Trust: 0.3

vendor:bluecoatmodel:ssl visibilityscope:eqversion:4.0

Trust: 0.3

vendor:bluecoatmodel:ssl visibility 3.8.4fcscope: - version: -

Trust: 0.3

vendor:bluecoatmodel:ssl visibilityscope:eqversion:3.12

Trust: 0.3

vendor:bluecoatmodel:ssl visibilityscope:eqversion:3.11

Trust: 0.3

vendor:bluecoatmodel:ssl visibilityscope:eqversion:3.10

Trust: 0.3

vendor:bluecoatmodel:security analyticsscope:eqversion:7.3

Trust: 0.3

vendor:bluecoatmodel:security analyticsscope:eqversion:7.2

Trust: 0.3

vendor:bluecoatmodel:security analyticsscope:eqversion:7.1

Trust: 0.3

vendor:bluecoatmodel:proxysgscope:eqversion:6.7

Trust: 0.3

vendor:bluecoatmodel:proxysgscope:eqversion:6.6

Trust: 0.3

vendor:bluecoatmodel:proxysgscope:eqversion:6.5

Trust: 0.3

vendor:bluecoatmodel:proxyclientscope:eqversion:3.4

Trust: 0.3

vendor:bluecoatmodel:proxyavscope:eqversion:3.5

Trust: 0.3

vendor:bluecoatmodel:policycenter s-seriesscope:eqversion:1.1

Trust: 0.3

vendor:bluecoatmodel:packetshaper s-seriesscope:eqversion:11.9

Trust: 0.3

vendor:bluecoatmodel:packetshaper s-seriesscope:eqversion:11.6

Trust: 0.3

vendor:bluecoatmodel:norman shark industrial control system protectionscope:eqversion:5.3

Trust: 0.3

vendor:bluecoatmodel:management centerscope:eqversion:1.11

Trust: 0.3

vendor:bluecoatmodel:malware analysis appliancescope:eqversion:4.2

Trust: 0.3

vendor:bluecoatmodel:mail threat defensescope:eqversion:1.1

Trust: 0.3

vendor:bluecoatmodel:intelligencecenter data collectorscope:eqversion:3.3

Trust: 0.3

vendor:bluecoatmodel:intelligencecenterscope:eqversion:3.3

Trust: 0.3

vendor:bluecoatmodel:directorscope:eqversion:6.1

Trust: 0.3

vendor:bluecoatmodel:content analysis systemscope:eqversion:1.3

Trust: 0.3

vendor:bluecoatmodel:content analysisscope:eqversion:2.2

Trust: 0.3

vendor:bluecoatmodel:content analysisscope:eqversion:2.1

Trust: 0.3

vendor:bluecoatmodel:client connectorscope:eqversion:1.6

Trust: 0.3

vendor:bluecoatmodel:cacheflowscope:eqversion:3.4.0

Trust: 0.3

vendor:bluecoatmodel:bcaaascope:eqversion:6.1

Trust: 0.3

vendor:bluecoatmodel:android mobile agentscope:eqversion:1.3

Trust: 0.3

vendor:bluecoatmodel:advanced secure gatewayscope:eqversion:6.7

Trust: 0.3

vendor:bluecoatmodel:advanced secure gatewayscope:eqversion:6.6

Trust: 0.3

vendor:opensslmodel:project openssl 1.1.0f-gitscope:neversion: -

Trust: 0.3

vendor:opensslmodel:project openssl 1.0.2l-gitscope:neversion: -

Trust: 0.3

vendor:mcafeemodel:web gatewayscope:neversion:7.8.0.2

Trust: 0.3

vendor:mcafeemodel:web gatewayscope:neversion:7.7.2.7

Trust: 0.3

sources: BID: 100515 // JVNDB: JVNDB-2017-007691 // CNNVD: CNNVD-201708-1172 // NVD: CVE-2017-3735

CVSS

SEVERITY

CVSSV2

CVSSV3

NVD: CVE-2017-3735
value: MEDIUM

Trust: 1.0

NVD: CVE-2017-3735
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201708-1172
value: MEDIUM

Trust: 0.6

VULMON: CVE-2017-3735
value: MEDIUM

Trust: 0.1

VULMON: CVE-2017-3735
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

NVD: CVE-2017-3735
baseSeverity: MEDIUM
baseScore: 5.3
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 1.4
version: 3.0

Trust: 1.0

NVD: CVE-2017-3735
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: HIGH
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULMON: CVE-2017-3735 // JVNDB: JVNDB-2017-007691 // CNNVD: CNNVD-201708-1172 // NVD: CVE-2017-3735

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.8

sources: JVNDB: JVNDB-2017-007691 // NVD: CVE-2017-3735

THREAT TYPE

remote

Trust: 0.7

sources: PACKETSTORM: 144899 // CNNVD: CNNVD-201708-1172

TYPE

buffer error

Trust: 0.6

sources: CNNVD: CNNVD-201708-1172

CONFIGURATIONS

sources: NVD: CVE-2017-3735

PATCH

title:Malformed X.509 IPAddressFamily could cause OOB read (CVE-2017-3735)url:https://www.openssl.org/news/secadv/20170828.txt

Trust: 0.8

title:OpenSSL Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=74447

Trust: 0.6

title:The Registerurl:https://www.theregister.co.uk/2019/02/11/phoenix_switch_flaws/

Trust: 0.2

title:Red Hat: Moderate: openssl security, bug fix, and enhancement updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=rhsa-20183221 - security advisory

Trust: 0.1

title:Ubuntu Security Notice: openssl vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=usn-3475-1

Trust: 0.1

title:Ubuntu Security Notice: openssl vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=usn-3611-2

Trust: 0.1

title:Debian Security Advisories: DSA-4017-1 openssl1.0 -- security updateurl:https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=c59b0b63bafaa6def9e5da50acf68ca8

Trust: 0.1

title:Debian Security Advisories: DSA-4018-1 openssl -- security updateurl:https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=ac7ab332aa094dcdde4da9f7cb2a19f1

Trust: 0.1

title:Red Hat: CVE-2017-3735url:https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database&qid=cve-2017-3735

Trust: 0.1

title:IBM: IBM Security Bulletin: IBM has announced a release for IBM Security Identity Governance and Intelligence in response to security vulnerabilities (CVE-2018-0732, CVE-2018-0739, CVE-2017-3735)url:https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog&qid=51b3583e976e4985408312c607116f9d

Trust: 0.1

title:IBM: IBM Security Bulletin: Vulnerability in OpenSSL affects Power Hardware Management Consoleurl:https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog&qid=c5bef9c9c0b7083c0a7333444658c6c0

Trust: 0.1

title:Arch Linux Issues: url:https://vulmon.com/vendoradvisory?qidtp=arch_linux_issues&qid=cve-2017-3735

Trust: 0.1

title:Amazon Linux AMI: ALAS-2018-1102url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami&qid=alas-2018-1102

Trust: 0.1

title:Symantec Security Advisories: SA157: OpenSSL Vulnerabilities 28-Aug-2017 and 2-Nov-2017url:https://vulmon.com/vendoradvisory?qidtp=symantec_security_advisories&qid=7d613a491eb4632d0bd09811cbeaee1e

Trust: 0.1

title:Arch Linux Advisories: [ASA-201712-9] openssl-1.0: multiple issuesurl:https://vulmon.com/vendoradvisory?qidtp=arch_linux_advisories&qid=asa-201712-9

Trust: 0.1

title:Arch Linux Advisories: [ASA-201711-14] openssl: multiple issuesurl:https://vulmon.com/vendoradvisory?qidtp=arch_linux_advisories&qid=asa-201711-14

Trust: 0.1

title:Arch Linux Advisories: [ASA-201711-15] lib32-openssl: multiple issuesurl:https://vulmon.com/vendoradvisory?qidtp=arch_linux_advisories&qid=asa-201711-15

Trust: 0.1

title:Arch Linux Advisories: [ASA-201712-11] lib32-openssl-1.0: multiple issuesurl:https://vulmon.com/vendoradvisory?qidtp=arch_linux_advisories&qid=asa-201712-11

Trust: 0.1

title:Red Hat: Critical: Red Hat Ansible Tower 3.3.1-2 Release - Container Imageurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=rhsa-20183505 - security advisory

Trust: 0.1

title:Amazon Linux 2: ALAS2-2018-1102url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux2&qid=alas2-2018-1102

Trust: 0.1

title:Tenable Security Advisories: [R1] Nessus 6.11.3 Fixes Multiple Third-party Vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=tenable_security_advisories&qid=tns-2017-15

Trust: 0.1

title:Brocade Security Advisories: BSA-2017-426url:https://vulmon.com/vendoradvisory?qidtp=brocade_security_advisories&qid=54471d90bb958ec54738385d1e0df724

Trust: 0.1

title:Tenable Security Advisories: [R1] SecurityCenter 5.6.0.1 Fixes Multiple Third-party Vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=tenable_security_advisories&qid=tns-2017-14

Trust: 0.1

title:Apple: macOS High Sierra 10.13.2, Security Update 2017-002 Sierra, and Security Update 2017-005 El Capitanurl:https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories&qid=cc1324af84bd22e484cbe183e71a45d0

Trust: 0.1

title:IBM: IBM Security Bulletin: Multiple Security Vulnerabilities fixed in IBM Security Access Manager Applianceurl:https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog&qid=a0291f848728c4e1a69043ce8e1fd54d

Trust: 0.1

title:IBM: IBM Security Bulletin: Multiple Security vulnerabilities have been fixed in the IBM Security Access Manager Applianceurl:https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog&qid=1519a5f830589c3bab8a20f4163374ae

Trust: 0.1

title:Oracle: Oracle Critical Patch Update Advisory - April 2018url:https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=4019ca77f50c7a34e4d97833e6f3321e

Trust: 0.1

title:Oracle: Oracle Critical Patch Update Advisory - July 2018url:https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=5f8c525f1408011628af1792207b2099

Trust: 0.1

title:Oracle Linux Bulletins: Oracle Linux Bulletin - July 2018url:https://vulmon.com/vendoradvisory?qidtp=oracle_linux_bulletins&qid=204a1aa9ebf7b5f47151e8b011269862

Trust: 0.1

title:Oracle: Oracle Critical Patch Update Advisory - January 2019url:https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=f655264a6935505d167bbf45f409a57b

Trust: 0.1

title:Oracle Linux Bulletins: Oracle Linux Bulletin - October 2018url:https://vulmon.com/vendoradvisory?qidtp=oracle_linux_bulletins&qid=9cb9a8ed428c6faca615e91d2f1a216d

Trust: 0.1

title:Oracle: Oracle Critical Patch Update Advisory - October 2018url:https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=81c63752a6f26433af2128b2e8c02385

Trust: 0.1

title:Oracle Solaris Third Party Bulletins: Oracle Solaris Third Party Bulletin - April 2018url:https://vulmon.com/vendoradvisory?qidtp=oracle_solaris_third_party_bulletins&qid=72fe5ebf222112c8481815fd7cefc7af

Trust: 0.1

title:IBM: IBM Security Bulletin: IBM Security Privileged Identity Manager is affected by multiple security vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog&qid=8580d3cd770371e2ef0f68ca624b80b0

Trust: 0.1

title:Oracle Solaris Third Party Bulletins: Oracle Solaris Third Party Bulletin - October 2017url:https://vulmon.com/vendoradvisory?qidtp=oracle_solaris_third_party_bulletins&qid=6283337cd31f81f24d445925f2138c0e

Trust: 0.1

title:Oracle: Oracle Critical Patch Update Advisory - January 2018url:https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=e2a7f287e9acc8c64ab3df71130bc64d

Trust: 0.1

title:core-kiturl:https://github.com/funtoo/core-kit

Trust: 0.1

sources: VULMON: CVE-2017-3735 // JVNDB: JVNDB-2017-007691 // CNNVD: CNNVD-201708-1172

EXTERNAL IDS

db:NVDid:CVE-2017-3735

Trust: 3.4

db:BIDid:100515

Trust: 2.0

db:SECTRACKid:1039726

Trust: 1.7

db:TENABLEid:TNS-2017-15

Trust: 1.7

db:TENABLEid:TNS-2017-14

Trust: 1.7

db:ICS CERTid:ICSA-19-024-02

Trust: 0.9

db:JVNDBid:JVNDB-2017-007691

Trust: 0.8

db:AUSCERTid:ESB-2019.1967

Trust: 0.6

db:AUSCERTid:ESB-2019.4645

Trust: 0.6

db:AUSCERTid:ESB-2019.0798

Trust: 0.6

db:AUSCERTid:ESB-2022.0696

Trust: 0.6

db:AUSCERTid:ESB-2019.2267

Trust: 0.6

db:AUSCERTid:ESB-2020.0095

Trust: 0.6

db:AUSCERTid:ESB-2019.2536

Trust: 0.6

db:JUNIPERid:JSA10990

Trust: 0.6

db:CNNVDid:CNNVD-201708-1172

Trust: 0.6

db:MCAFEEid:SB10211

Trust: 0.3

db:VULMONid:CVE-2017-3735

Trust: 0.1

db:PACKETSTORMid:150193

Trust: 0.1

db:PACKETSTORMid:147233

Trust: 0.1

db:PACKETSTORMid:145270

Trust: 0.1

db:PACKETSTORMid:150049

Trust: 0.1

db:PACKETSTORMid:144899

Trust: 0.1

db:PACKETSTORMid:145423

Trust: 0.1

sources: VULMON: CVE-2017-3735 // BID: 100515 // JVNDB: JVNDB-2017-007691 // PACKETSTORM: 150193 // PACKETSTORM: 147233 // PACKETSTORM: 145270 // PACKETSTORM: 150049 // PACKETSTORM: 144899 // PACKETSTORM: 145423 // CNNVD: CNNVD-201708-1172 // NVD: CVE-2017-3735

REFERENCES

url:http://www.securityfocus.com/bid/100515

Trust: 2.3

url:https://www.openssl.org/news/secadv/20170828.txt

Trust: 2.0

url:https://github.com/openssl/openssl/commit/068b963bb7afc57f5bdd723de0dd15e7795d5822

Trust: 2.0

url:https://access.redhat.com/errata/rhsa-2018:3221

Trust: 1.9

url:https://security.gentoo.org/glsa/201712-03

Trust: 1.8

url:https://access.redhat.com/errata/rhsa-2018:3505

Trust: 1.8

url:https://www.openssl.org/news/secadv/20171102.txt

Trust: 1.7

url:https://www.debian.org/security/2017/dsa-4018

Trust: 1.7

url:https://www.debian.org/security/2017/dsa-4017

Trust: 1.7

url:https://security.netapp.com/advisory/ntap-20171107-0002/

Trust: 1.7

url:https://security.netapp.com/advisory/ntap-20170927-0001/

Trust: 1.7

url:http://www.securitytracker.com/id/1039726

Trust: 1.7

url:https://www.tenable.com/security/tns-2017-14

Trust: 1.7

url:https://security.freebsd.org/advisories/freebsd-sa-17:11.openssl.asc

Trust: 1.7

url:https://www.tenable.com/security/tns-2017-15

Trust: 1.7

url:https://support.apple.com/ht208331

Trust: 1.7

url:http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html

Trust: 1.7

url:https://lists.debian.org/debian-lts-announce/2017/11/msg00011.html

Trust: 1.7

url:https://usn.ubuntu.com/3611-2/

Trust: 1.7

url:http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html

Trust: 1.7

url:http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html

Trust: 1.7

url:http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html

Trust: 1.7

url:https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html

Trust: 1.7

url:https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html

Trust: 1.7

url:https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html

Trust: 1.7

url:https://nvd.nist.gov/vuln/detail/cve-2017-3735

Trust: 1.4

url:https://www.oracle.com//security-alerts/cpujul2021.html

Trust: 1.0

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-3735

Trust: 0.8

url:https://www.us-cert.gov/ics/advisories/icsa-19-024-02

Trust: 0.8

url:https://www.suse.com/support/update/announcement/2019/suse-su-201914246-1.html

Trust: 0.6

url:http://www.ibm.com/support/docview.wss?uid=ibm10887987

Trust: 0.6

url:http://www.ibm.com/support/docview.wss?uid=ibm10887995

Trust: 0.6

url:http://www.ibm.com/support/docview.wss?uid=ibm10887989

Trust: 0.6

url:http://www.ibm.com/support/docview.wss?uid=ibm10887985

Trust: 0.6

url:http://www.ibm.com/support/docview.wss?uid=ibm10887991

Trust: 0.6

url:http://www.ibm.com/support/docview.wss?uid=ibm10888379

Trust: 0.6

url:http://www.ibm.com/support/docview.wss?uid=ibm10886247

Trust: 0.6

url:http://kb.juniper.net/infocenter/index?page=content&id=jsa10990

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.0696

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2019.2536/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/77010

Trust: 0.6

url:https://www-01.ibm.com/support/docview.wss?uid=ibm10794451

Trust: 0.6

url:https://www-01.ibm.com/support/docview.wss?uid=ibm10886247

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2019.2267/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2019.4645/

Trust: 0.6

url:https://www-01.ibm.com/support/docview.wss?uid=ibm10887987

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.0095/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2019.1967/

Trust: 0.6

url:https://www-01.ibm.com/support/docview.wss?uid=ibm10888379

Trust: 0.6

url:https://access.redhat.com/security/cve/cve-2017-3735

Trust: 0.5

url:https://github.com/openssl/openssl/pull/4276

Trust: 0.3

url:https://bugzilla.redhat.com/show_bug.cgi?id=1486144

Trust: 0.3

url:https://www.openssl.org/news/vulnerabilities.html#y2016

Trust: 0.3

url:http://openssl.org/

Trust: 0.3

url:https://kc.mcafee.com/corporate/index?page=content&id=sb10211

Trust: 0.3

url:https://www.symantec.com/security-center/network-protection-security-advisories/sa157

Trust: 0.3

url:http://aix.software.ibm.com/aix/efixes/security/openssl_advisory24.asc

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2018-0739

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2018-0495

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2018-0739

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2018-0737

Trust: 0.2

url:https://access.redhat.com/security/team/contact/

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2018-0737

Trust: 0.2

url:https://www.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2018-0732

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2018-0495

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2018-0732

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2017-3736

Trust: 0.2

url:https://cwe.mitre.org/data/definitions/119.html

Trust: 0.1

url:https://usn.ubuntu.com/3475-1/

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://ics-cert.us-cert.gov/advisories/icsa-19-024-02

Trust: 0.1

url:https://tools.cisco.com/security/center/viewalert.x?alertid=56174

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-13988

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-14682

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-14681

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-1060

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-14680

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-16837

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-14679

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-13988

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-1061

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-12384

Trust: 0.1

url:https://access.redhat.com/security/updates/classification/#critical

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2017-1000050

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2016-9396

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-1000050

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-10846

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-10768

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-1061

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-14680

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-17456

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-1000805

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-10767

Trust: 0.1

url:https://docs.ansible.com/ansible-tower/latest/html/upgrade-migration-guide/

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-12910

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-10768

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-10845

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-1060

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-9262

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-10767

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-1000805

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-10733

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-10844

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-10845

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-16837

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-17456

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-10846

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-12384

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-9262

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-14679

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2017-18267

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-10733

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-18267

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-12910

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-14681

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-14682

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-10844

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-9396

Trust: 0.1

url:https://usn.ubuntu.com/usn/usn-3611-1

Trust: 0.1

url:https://usn.ubuntu.com/usn/usn-3611-2

Trust: 0.1

url:https://support.apple.com/kb/ht201222

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-13860

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-13869

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-13875

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-13878

Trust: 0.1

url:https://support.apple.com/downloads/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-13867

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-13855

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-13858

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-13868

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-13872

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-13826

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-9798

Trust: 0.1

url:https://www.apple.com/support/security/pgp/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-13844

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-13848

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-13865

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-13833

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-1000254

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-13847

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-13862

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-13883

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-13871

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-13876

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/7.6_release_notes/index

Trust: 0.1

url:https://bugzilla.redhat.com/):

Trust: 0.1

url:https://access.redhat.com/security/team/key/

Trust: 0.1

url:https://access.redhat.com/articles/11258

Trust: 0.1

url:https://access.redhat.com/security/updates/classification/#moderate

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/openssl/1.0.2g-1ubuntu4.9

Trust: 0.1

url:https://www.ubuntu.com/usn/usn-3475-1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/openssl/1.0.1f-1ubuntu2.23

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/openssl/1.0.2g-1ubuntu11.3

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/openssl/1.0.2g-1ubuntu13.2

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-3737

Trust: 0.1

url:http://creativecommons.org/licenses/by-sa/2.5

Trust: 0.1

url:https://nvd.nist.gov/nvd.cfm?cvename=cve-2017-3737

Trust: 0.1

url:https://nvd.nist.gov/nvd.cfm?cvename=cve-2017-3736

Trust: 0.1

url:https://nvd.nist.gov/nvd.cfm?cvename=cve-2017-3738

Trust: 0.1

url:https://nvd.nist.gov/nvd.cfm?cvename=cve-2017-3735

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-3738

Trust: 0.1

url:https://security.gentoo.org/

Trust: 0.1

url:https://bugs.gentoo.org.

Trust: 0.1

sources: VULMON: CVE-2017-3735 // BID: 100515 // JVNDB: JVNDB-2017-007691 // PACKETSTORM: 150193 // PACKETSTORM: 147233 // PACKETSTORM: 145270 // PACKETSTORM: 150049 // PACKETSTORM: 144899 // PACKETSTORM: 145423 // CNNVD: CNNVD-201708-1172 // NVD: CVE-2017-3735

CREDITS

Google's OSS-Fuzz project

Trust: 0.3

sources: BID: 100515

SOURCES

db:VULMONid:CVE-2017-3735
db:BIDid:100515
db:JVNDBid:JVNDB-2017-007691
db:PACKETSTORMid:150193
db:PACKETSTORMid:147233
db:PACKETSTORMid:145270
db:PACKETSTORMid:150049
db:PACKETSTORMid:144899
db:PACKETSTORMid:145423
db:CNNVDid:CNNVD-201708-1172
db:NVDid:CVE-2017-3735

LAST UPDATE DATE

2022-05-05T07:01:50.040000+00:00


SOURCES UPDATE DATE

db:VULMONid:CVE-2017-3735date:2021-07-20T00:00:00
db:BIDid:100515date:2018-01-18T06:00:00
db:JVNDBid:JVNDB-2017-007691date:2019-07-10T00:00:00
db:CNNVDid:CNNVD-201708-1172date:2022-03-10T00:00:00
db:NVDid:CVE-2017-3735date:2021-07-20T23:15:00

SOURCES RELEASE DATE

db:VULMONid:CVE-2017-3735date:2017-08-28T00:00:00
db:BIDid:100515date:2017-08-28T00:00:00
db:JVNDBid:JVNDB-2017-007691date:2017-09-29T00:00:00
db:PACKETSTORMid:150193date:2018-11-06T21:04:36
db:PACKETSTORMid:147233date:2018-04-18T20:05:17
db:PACKETSTORMid:145270date:2017-12-08T10:11:11
db:PACKETSTORMid:150049date:2018-10-31T00:56:45
db:PACKETSTORMid:144899date:2017-11-06T22:24:00
db:PACKETSTORMid:145423date:2017-12-15T14:15:17
db:CNNVDid:CNNVD-201708-1172date:2017-08-28T00:00:00
db:NVDid:CVE-2017-3735date:2017-08-28T19:29:00