First published: Thu May 04 2017(Updated: )
During a renegotiation handshake if the Encrypt-Then-Mac extension is negotiated where it was not in the original handshake (or vice-versa) then this can cause OpenSSL 1.1.0 before 1.1.0e to crash (dependent on ciphersuite). Both clients and servers are affected.
Credit: openssl-security@openssl.org
Affected Software | Affected Version | How to fix |
---|---|---|
OpenSSL libcrypto | =1.1.0 | |
OpenSSL libcrypto | =1.1.0a | |
OpenSSL libcrypto | =1.1.0b | |
OpenSSL libcrypto | =1.1.0c | |
OpenSSL libcrypto | =1.1.0d | |
HP Operations Agent | =11.14 | |
HP Operations Agent | =11.15 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-3733 is considered a high severity vulnerability due to the potential for OpenSSL to crash during a renegotiation handshake.
To fix CVE-2017-3733, upgrade OpenSSL to version 1.1.0e or later.
CVE-2017-3733 affects OpenSSL versions 1.1.0 through 1.1.0d.
CVE-2017-3733 impacts both client and server systems that utilize the affected versions of OpenSSL.
CVE-2017-3733 involves a crash that can occur due to a mismatch in the Encrypt-Then-Mac extension during the renegotiation handshake.