Executive Summary



This Alert is flagged as TOP 25 Common Weakness Enumeration from CWE/SANS. For more information, you can read this.
Informations
Name CVE-2017-3737 First vendor Publication 2017-12-07
Vendor Cve Last vendor Modification 2019-10-03

Security-Database Scoring CVSS v3

Cvss vector : CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
Overall CVSS Score 5.9
Base Score 5.9 Environmental Score 5.9
impact SubScore 3.6 Temporal Score 5.9
Exploitabality Sub Score 2.2
 
Attack Vector Network Attack Complexity High
Privileges Required None User Interaction None
Scope Unchanged Confidentiality Impact High
Integrity Impact None Availability Impact None
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:P/I:N/A:N)
Cvss Base Score 4.3 Attack Range Network
Cvss Impact Score 2.9 Attack Complexity Medium
Cvss Expoit Score 8.6 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

OpenSSL 1.0.2 (starting from version 1.0.2b) introduced an "error state" mechanism. The intent was that if a fatal error occurred during a handshake then OpenSSL would move into the error state and would immediately fail if you attempted to continue the handshake. This works as designed for the explicit handshake functions (SSL_do_handshake(), SSL_accept() and SSL_connect()), however due to a bug it does not work correctly if SSL_read() or SSL_write() is called directly. In that scenario, if the handshake fails then a fatal error will be returned in the initial function call. If SSL_read()/SSL_write() is subsequently called by the application for the same SSL object then it will succeed and the data is passed without being decrypted/encrypted directly from the SSL/TLS record layer. In order to exploit this issue an application bug would have to be present that resulted in a call to SSL_read()/SSL_write() being issued after having already received a fatal error. OpenSSL version 1.0.2b-1.0.2m are affected. Fixed in OpenSSL 1.0.2n. OpenSSL 1.1.0 is not affected.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3737

CWE : Common Weakness Enumeration

% Id Name
50 % CWE-787 Out-of-bounds Write (CWE/SANS Top 25)
50 % CWE-125 Out-of-bounds Read

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 12
Os 1

Nessus® Vulnerability Scanner

Date Description
2018-08-17 Name : The remote PhotonOS host is missing multiple security updates.
File : PhotonOS_PHSA-2018-1_0-0097-a.nasl - Type : ACT_GATHER_INFO
2018-08-09 Name : A web application running on the remote host is affected by multiple vulnerab...
File : mysql_enterprise_monitor_4_0_4_5233.nasl - Type : ACT_GATHER_INFO
2018-07-24 Name : The remote PhotonOS host is missing multiple security updates.
File : PhotonOS_PHSA-2018-2_0-0010-a.nasl - Type : ACT_GATHER_INFO
2018-07-03 Name : The remote EulerOS host is missing multiple security updates.
File : EulerOS_SA-2018-1179.nasl - Type : ACT_GATHER_INFO
2018-05-11 Name : The remote Amazon Linux AMI host is missing a security update.
File : ala_ALAS-2018-1016.nasl - Type : ACT_GATHER_INFO
2018-05-02 Name : The remote EulerOS host is missing multiple security updates.
File : EulerOS_SA-2018-1115.nasl - Type : ACT_GATHER_INFO
2018-04-27 Name : The remote host is affected by multiple vulnerabilities.
File : juniper_nsm_jsa10851.nasl - Type : ACT_GATHER_INFO
2018-04-27 Name : The remote CentOS host is missing one or more security updates.
File : centos_RHSA-2018-0998.nasl - Type : ACT_GATHER_INFO
2018-04-27 Name : The remote Amazon Linux 2 host is missing a security update.
File : al2_ALAS-2018-1004.nasl - Type : ACT_GATHER_INFO
2018-03-08 Name : The remote AIX host has a version of OpenSSL installed that is affected by an...
File : aix_openssl_advisory25.nasl - Type : ACT_GATHER_INFO
2018-01-17 Name : The remote database server is affected by multiple vulnerabilities.
File : mysql_5_7_21.nasl - Type : ACT_GATHER_INFO
2018-01-17 Name : The remote database server is affected by multiple vulnerabilities.
File : mysql_5_7_21_rpm.nasl - Type : ACT_GATHER_INFO
2018-01-17 Name : The remote database server is affected by multiple vulnerabilities.
File : mysql_5_6_39_rpm.nasl - Type : ACT_GATHER_INFO
2018-01-17 Name : The remote database server is affected by multiple vulnerabilities.
File : mysql_5_6_39.nasl - Type : ACT_GATHER_INFO
2017-12-18 Name : The remote SUSE host is missing one or more security updates.
File : suse_SU-2017-3343-1.nasl - Type : ACT_GATHER_INFO
2017-12-18 Name : The remote openSUSE host is missing a security update.
File : openSUSE-2017-1381.nasl - Type : ACT_GATHER_INFO
2017-12-18 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-4065.nasl - Type : ACT_GATHER_INFO
2017-12-15 Name : A service running on the remote host is affected by multiple vulnerabilities.
File : openssl_1_0_2n.nasl - Type : ACT_GATHER_INFO
2017-12-15 Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-201712-03.nasl - Type : ACT_GATHER_INFO
2017-12-15 Name : The remote FreeBSD host is missing one or more security-related updates.
File : freebsd_pkg_bea84a7ae0c911e7b4f311baa0c2df21.nasl - Type : ACT_GATHER_INFO
2017-12-12 Name : The remote Ubuntu host is missing a security-related patch.
File : ubuntu_USN-3512-1.nasl - Type : ACT_GATHER_INFO
2017-12-11 Name : The remote FreeBSD host is missing one or more security-related updates.
File : freebsd_pkg_9f7a0f39ddc011e7b5afa4badb2f4699.nasl - Type : ACT_GATHER_INFO
2017-12-11 Name : The remote Slackware host is missing a security update.
File : Slackware_SSA_2017-342-01.nasl - Type : ACT_GATHER_INFO
2017-12-08 Name : The remote FreeBSD host is missing a security-related update.
File : freebsd_pkg_3bb451fcdb6411e7ac58b499baebfeaf.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

Source Url
BID http://www.securityfocus.com/bid/102103
CONFIRM http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
https://cert-portal.siemens.com/productcert/pdf/ssa-179516.pdf
https://github.com/openssl/openssl/commit/898fb884b706aaeb283de4812340bb0bde8...
https://security.netapp.com/advisory/ntap-20171208-0001/
https://security.netapp.com/advisory/ntap-20180117-0002/
https://security.netapp.com/advisory/ntap-20180419-0002/
https://www.openssl.org/news/secadv/20171207.txt
https://www.tenable.com/security/tns-2017-16
DEBIAN https://www.debian.org/security/2017/dsa-4065
FREEBSD https://security.FreeBSD.org/advisories/FreeBSD-SA-17:12.openssl.asc
GENTOO https://security.gentoo.org/glsa/201712-03
MISC https://www.digitalmunition.me/2017/12/cve-2017-3737-openssl-security-bypass-...
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
REDHAT https://access.redhat.com/errata/RHSA-2018:0998
https://access.redhat.com/errata/RHSA-2018:2185
https://access.redhat.com/errata/RHSA-2018:2186
https://access.redhat.com/errata/RHSA-2018:2187
SECTRACK http://www.securitytracker.com/id/1039978

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
Date Informations
2021-05-04 13:01:39
  • Multiple Updates
2021-04-22 02:15:07
  • Multiple Updates
2020-05-23 01:00:29
  • Multiple Updates
2019-10-03 09:20:22
  • Multiple Updates
2019-07-24 12:03:54
  • Multiple Updates
2018-08-09 09:19:23
  • Multiple Updates
2018-07-19 09:19:09
  • Multiple Updates
2018-07-14 09:19:21
  • Multiple Updates
2018-04-21 09:19:34
  • Multiple Updates
2018-04-20 09:19:16
  • Multiple Updates
2018-04-12 09:18:54
  • Multiple Updates
2018-01-24 09:22:14
  • Multiple Updates
2018-01-18 21:22:37
  • Multiple Updates
2018-01-18 09:21:57
  • Multiple Updates
2017-12-23 00:21:34
  • Multiple Updates
2017-12-19 13:23:50
  • Multiple Updates
2017-12-19 09:22:11
  • Multiple Updates
2017-12-16 13:23:35
  • Multiple Updates
2017-12-16 09:21:44
  • Multiple Updates
2017-12-14 09:21:28
  • Multiple Updates
2017-12-13 13:23:52
  • Multiple Updates
2017-12-12 13:24:21
  • Multiple Updates
2017-12-11 09:22:14
  • Multiple Updates
2017-12-10 09:22:12
  • Multiple Updates
2017-12-09 13:24:14
  • Multiple Updates
2017-12-09 09:22:23
  • Multiple Updates
2017-12-07 21:22:47
  • First insertion