First published: Thu Nov 02 2017(Updated: )
Last updated 24 July 2024
Credit: openssl-security@openssl.org openssl-security@openssl.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/jbcs-httpd24-apache-commons-daemon | <0:1.1.0-1.redhat_2.1.jbcs.el6 | 0:1.1.0-1.redhat_2.1.jbcs.el6 |
redhat/jbcs-httpd24-apache-commons-daemon-jsvc | <1:1.1.0-1.redhat_2.jbcs.el6 | 1:1.1.0-1.redhat_2.jbcs.el6 |
redhat/jbcs-httpd24-apr | <0:1.6.3-14.jbcs.el6 | 0:1.6.3-14.jbcs.el6 |
redhat/jbcs-httpd24-apr-util | <0:1.6.1-9.jbcs.el6 | 0:1.6.1-9.jbcs.el6 |
redhat/jbcs-httpd24-httpd | <0:2.4.29-17.jbcs.el6 | 0:2.4.29-17.jbcs.el6 |
redhat/jbcs-httpd24-nghttp2 | <0:1.29.0-8.jbcs.el6 | 0:1.29.0-8.jbcs.el6 |
redhat/jbcs-httpd24-openssl | <1:1.0.2n-11.jbcs.el6 | 1:1.0.2n-11.jbcs.el6 |
redhat/jbcs-httpd24-apache-commons-daemon | <0:1.1.0-1.redhat_2.1.jbcs.el7 | 0:1.1.0-1.redhat_2.1.jbcs.el7 |
redhat/jbcs-httpd24-apache-commons-daemon-jsvc | <1:1.1.0-1.redhat_2.jbcs.el7 | 1:1.1.0-1.redhat_2.jbcs.el7 |
redhat/jbcs-httpd24-apr | <0:1.6.3-14.jbcs.el7 | 0:1.6.3-14.jbcs.el7 |
redhat/jbcs-httpd24-apr-util | <0:1.6.1-9.jbcs.el7 | 0:1.6.1-9.jbcs.el7 |
redhat/jbcs-httpd24-httpd | <0:2.4.29-17.jbcs.el7 | 0:2.4.29-17.jbcs.el7 |
redhat/jbcs-httpd24-nghttp2 | <0:1.29.0-8.jbcs.el7 | 0:1.29.0-8.jbcs.el7 |
redhat/jbcs-httpd24-openssl | <1:1.0.2n-11.jbcs.el7 | 1:1.0.2n-11.jbcs.el7 |
redhat/java | <1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10 | 1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10 |
redhat/openssl | <1:1.0.2k-12.el7 | 1:1.0.2k-12.el7 |
redhat/java | <1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7 | 1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7 |
OpenSSL OpenSSL | >=1.0.2<1.0.2m | |
OpenSSL OpenSSL | >=1.1.0<1.1.0g | |
redhat/openssl | <1.1.0 | 1.1.0 |
redhat/openssl | <1.0.2 | 1.0.2 |
IBM Security Verify Governance | <=10.0 | |
debian/openssl | 1.1.1w-0+deb11u1 1.1.1n-0+deb11u5 3.0.14-1~deb12u1 3.0.14-1~deb12u2 3.3.2-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
The severity of CVE-2017-3736 is medium with a severity value of 6.5.
CVE-2017-3736 affects OpenSSL versions before 1.0.2m and 1.1.0 before 1.1.0g on the x86_64 architecture.
No, RSA and DSA algorithms are not affected by CVE-2017-3736.
Yes, attacks against RSA and DSA as a result of CVE-2017-3736 are believed to be very difficult to perform and unlikely.
To fix CVE-2017-3736, update OpenSSL to version 1.0.2m or higher, or version 1.1.0g or higher.