Vulnerability identifier: #VU50745
Vulnerability risk: Medium
Exploitation vector: Network
Exploit availability: No
Vendor: OpenSSL Software Foundation
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input during EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate calls. A remote attacker can pass specially crafted input to the application and perform a denial of service (DoS) attack.
Install updates from vendor's website.
Vulnerable software versions
OpenSSL: 1.1.1 - 1.1.1i, 1.1.0 - 1.1.0l, 1.0.2 - 1.0.2x, 1.0.1 - 1.0.1u, 1.0.0 - 1.0.0t
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.