CVE-2020-1967

Scores

EPSS

0.673medium67.3%
0%20%40%60%80%100%

Percentile: 67.3%

CVSS

7.5high3.x
0246810

CVSS Score: 7.5/10

All CVSS Scores

CVSS 3.x
7.5

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CVSS 2.0
5.0

Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Description

Server or client applications that call the SSL_check_chain() function during or after a TLS 1.3 handshake may crash due to a NULL pointer dereference as a result of incorrect handling of the “signature_algorithms_cert” TLS extension. The crash occurs if an invalid or unrecognised signature algorithm is received from the peer. This could be exploited by a malicious peer in a Denial of Service attack. OpenSSL version 1.1.1d, 1.1.1e, and 1.1.1f are affected by this issue. This issue did not affect OpenSSL versions prior to 1.1.1d. Fixed in OpenSSL 1.1.1g (Affected 1.1.1d-1.1.1f).

Scaner-VS 7 — a modern vulnerability management solution

Uses this database for vulnerability detection. High-speed search, cross-platform, advanced configuration audit, and flexible filtering. Suitable for organizations of any size.
Learn more about Scaner-VS 7

Sources

debiannvdubuntu

CWEs

CWE-476

Related Vulnerabilities

Exploits

Exploit ID: CVE-2020-1967

Source: github-poc

URL: https://github.com/irsl/CVE-2020-1967

Vulnerable Software (41)

Type: Configuration

Product: edk2

Operating System: ubuntu bionic 18.04

Trait:
{  "unaffected": true}

Source: ubuntu

Type: Configuration

Product: edk2

Operating System: ubuntu eoan 19.10

Trait:
{  "unaffected": true}

Source: ubuntu

Type: Configuration

Product: edk2

Operating System: ubuntu focal 20.04

Trait:
{  "unaffected": true}

Source: ubuntu

Type: Configuration

Product: edk2

Operating System: ubuntu trusty 14.04

Trait:
{  "unfixed": true}

Source: ubuntu

Type: Configuration

Product: edk2

Operating System: ubuntu xenial 16.04

Trait:
{  "unaffected": true}

Source: ubuntu

Type: Configuration

Product: openssl

Operating System: ubuntu bionic 18.04

Trait:
{  "unaffected": true}

Source: ubuntu

Type: Configuration

Product: openssl

Operating System: ubuntu eoan 19.10

Trait:
{  "unaffected": true}

Source: ubuntu

Type: Configuration

Product: openssl

Operating System: ubuntu focal 20.04

Trait:
{  "fixed": "1.1.1f-1ubuntu2"}

Source: ubuntu

Type: Configuration

Product: openssl

Operating System: ubuntu trusty 14.04

Trait:
{  "unfixed": true}

Source: ubuntu

Type: Configuration

Product: openssl

Operating System: ubuntu xenial 16.04

Trait:
{  "unaffected": true}

Source: ubuntu

Type: Configuration

Product: openssl

Operating System: debian

Trait:
{  "fixed": "1.1.1g-1"}

Source: debian

Type: Configuration

Product: openssl

Operating System: debian stretch 9

Trait:
{  "unaffected": true}

Source: debian

Type: Configuration

Product: openssl

Operating System: debian jessie 8

Trait:
{  "unaffected": true}

Source: debian

Type: Configuration

Product: openssl1.0

Operating System: ubuntu bionic 18.04

Trait:
{  "unaffected": true}

Source: ubuntu

Type: Configuration

Product: openssl1.0

Operating System: debian

Trait:
{  "unaffected": true}

Source: debian

Type: Configuration

Vendor: *

Product: active_iq_unified_manager

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*",      "versionStartIncluding": "7.3",      "vulnerable": true    },    {      "cpe23u...

Source: nvd

Type: Configuration

Vendor: *

Product: application_server

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:oracle:application_server:12.1.3:*:*:*:*:*:*:*",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:a:oracle:enterprise_manager_base...

Source: nvd

Type: Configuration

Vendor: *

Product: debian_linux

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"...

Source: nvd

Type: Configuration

Vendor: *

Product: e-series_performance_analyzer

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*",      "versionStartIncluding": "7.3",      "vulnerable": true    },    {      "cpe23u...

Source: nvd

Type: Configuration

Vendor: *

Product: enterprise_manager_base_platform

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:oracle:application_server:12.1.3:*:*:*:*:*:*:*",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:a:oracle:enterprise_manager_base...

Source: nvd