First published: Tue Mar 27 2018(Updated: )
Constructed ASN.1 types with a recursive definition (such as can be found in PKCS7) could eventually exceed the stack given malicious input with excessive recursion. This could result in a Denial Of Service attack. There are no such structures used within SSL/TLS that come from untrusted sources so this is considered safe. Fixed in OpenSSL 1.1.0h (Affected 1.1.0-1.1.0g). Fixed in OpenSSL 1.0.2o (Affected 1.0.2b-1.0.2n).
Credit: openssl-security@openssl.org openssl-security@openssl.org
Affected Software | Affected Version | How to fix |
---|---|---|
OpenSSL OpenSSL | >=1.0.2b<=1.0.2n | |
OpenSSL OpenSSL | >=1.1.0<=1.1.0g | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =17.10 | |
Debian Debian Linux | =7.0 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
redhat/openssl | <1.1.0 | 1.1.0 |
redhat/openssl | <1.0.2 | 1.0.2 |
IBM Security Verify Governance | <=10.0 | |
debian/libtomcrypt | 1.18.2-5 1.18.2-6 1.18.2+dfsg-7 | |
debian/openssl | 1.1.1w-0+deb11u1 1.1.1n-0+deb11u5 3.0.14-1~deb12u1 3.0.14-1~deb12u2 3.3.2-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-0739 is a vulnerability in OpenSSL that could result in a Denial of Service attack.
CVE-2018-0739 has a severity score of 6.5 (Medium).
The OpenSSL versions 1.1.0 and 1.0.2 are affected by CVE-2018-0739.
To fix CVE-2018-0739, you should update OpenSSL to version 1.0.2 or 1.1.0, as recommended by the vendor.
You can find more information about CVE-2018-0739 on the OpenSSL website and the provided references.