Vulnerability identifier: #VU50745
Vulnerability risk: Medium
CVSSv3.1:
CVE-ID:
CWE-ID:
CWE-20
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
OpenSSL
Server applications /
Encryption software
Vendor: OpenSSL Software Foundation
Description
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input during EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate calls. A remote attacker can pass specially crafted input to the application and perform a denial of service (DoS) attack.
Mitigation
Install updates from vendor's website.
Vulnerable software versions
OpenSSL: 1.1.1 - 1.1.1i, 1.1.0 - 1.1.0l, 1.0.2 - 1.0.2x, 1.0.1 - 1.0.1u, 1.0.0 - 1.0.0t
CPE
External links
http://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1
http://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2
http://www.openssl.org/news/secadv/20210216.txt
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?