First published: Wed Dec 02 2020(Updated: )
A null pointer dereference flaw was found in openssl. A remote attacker, able to control the arguments of the GENERAL_NAME_cmp function, could cause the application, compiled with openssl to crash resulting in a denial of service. The highest threat from this vulnerability is to system availability.
Credit: openssl-security@openssl.org openssl-security@openssl.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/jbcs-httpd24-brotli | <0:1.0.6-40.jbcs.el7 | 0:1.0.6-40.jbcs.el7 |
redhat/jbcs-httpd24-httpd | <0:2.4.37-66.jbcs.el7 | 0:2.4.37-66.jbcs.el7 |
redhat/jbcs-httpd24-nghttp2 | <0:1.39.2-35.jbcs.el7 | 0:1.39.2-35.jbcs.el7 |
redhat/jbcs-httpd24-openssl | <1:1.1.1g-3.jbcs.el7 | 1:1.1.1g-3.jbcs.el7 |
redhat/jbcs-httpd24-openssl-chil | <0:1.0.0-3.jbcs.el7 | 0:1.0.0-3.jbcs.el7 |
redhat/jbcs-httpd24-openssl-pkcs11 | <0:0.4.10-18.jbcs.el7 | 0:0.4.10-18.jbcs.el7 |
redhat/openssl | <0:1.0.1e-59.el6_10 | 0:1.0.1e-59.el6_10 |
redhat/openssl | <1:1.0.2k-21.el7_9 | 1:1.0.2k-21.el7_9 |
redhat/openssl | <1:1.0.1e-52.el7_2 | 1:1.0.1e-52.el7_2 |
redhat/openssl | <1:1.0.1e-61.el7_3 | 1:1.0.1e-61.el7_3 |
redhat/openssl | <1:1.0.2k-9.el7_4 | 1:1.0.2k-9.el7_4 |
redhat/openssl | <1:1.0.2k-17.el7_6 | 1:1.0.2k-17.el7_6 |
redhat/openssl | <1:1.0.2k-20.el7_7 | 1:1.0.2k-20.el7_7 |
redhat/openssl | <1:1.1.1g-12.el8_3 | 1:1.1.1g-12.el8_3 |
redhat/openssl | <1:1.1.1-9.el8_0 | 1:1.1.1-9.el8_0 |
redhat/openssl | <1:1.1.1c-3.el8_1 | 1:1.1.1c-3.el8_1 |
redhat/openssl | <1:1.1.1c-16.el8_2 | 1:1.1.1c-16.el8_2 |
redhat/tomcat-native | <0:1.2.23-23.redhat_23.ep7.el7 | 0:1.2.23-23.redhat_23.ep7.el7 |
redhat/jws5-tomcat | <0:9.0.36-9.redhat_8.1.el7 | 0:9.0.36-9.redhat_8.1.el7 |
redhat/jws5-tomcat-native | <0:1.2.25-3.redhat_3.el7 | 0:1.2.25-3.redhat_3.el7 |
redhat/jws5-tomcat | <0:9.0.36-9.redhat_8.1.el8 | 0:9.0.36-9.redhat_8.1.el8 |
redhat/jws5-tomcat-native | <0:1.2.25-3.redhat_3.el8 | 0:1.2.25-3.redhat_3.el8 |
OpenSSL OpenSSL | >=1.0.2<1.0.2x | |
OpenSSL OpenSSL | >=1.1.1<1.1.1i | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
Fedoraproject Fedora | =32 | |
Fedoraproject Fedora | =33 | |
Oracle API Gateway | =11.1.2.4.0 | |
Oracle Business Intelligence | =5.5.0.0.0 | |
Oracle Business Intelligence | =5.9.0.0.0 | |
Oracle Business Intelligence | =12.2.1.3.0 | |
Oracle Business Intelligence | =12.2.1.4.0 | |
Oracle Communications Cloud Native Core Network Function Cloud Native Environment | =1.10.0 | |
Oracle Communications Diameter Intelligence Hub | >=8.0.0<=8.1.0 | |
Oracle Communications Diameter Intelligence Hub | >=8.2.0<=8.2.3 | |
Oracle Communications Session Border Controller | =cz8.2 | |
Oracle Communications Session Border Controller | =cz8.3 | |
Oracle Communications Session Border Controller | =cz8.4 | |
Oracle Communications Session Router | =cz8.2 | |
Oracle Communications Session Router | =cz8.3 | |
Oracle Communications Session Router | =cz8.4 | |
Oracle Communications Subscriber-aware Load Balancer | =cz8.2 | |
Oracle Communications Subscriber-aware Load Balancer | =cz8.3 | |
Oracle Communications Subscriber-aware Load Balancer | =cz8.4 | |
Oracle Communications Unified Session Manager | =scz8.2.5 | |
Oracle Enterprise Communications Broker | =pcz3.1 | |
Oracle Enterprise Communications Broker | =pcz3.2 | |
Oracle Enterprise Communications Broker | =pcz3.3 | |
Oracle Enterprise Manager Base Platform | =13.3.0.0 | |
Oracle Enterprise Manager Base Platform | =13.4.0.0 | |
Oracle Enterprise Manager For Storage Management | =13.4.0.0 | |
Oracle Enterprise Manager Ops Center | =12.4.0.0 | |
Oracle Enterprise Session Border Controller | =cz8.2 | |
Oracle Enterprise Session Border Controller | =cz8.3 | |
Oracle Enterprise Session Border Controller | =cz8.4 | |
Oracle Essbase | =21.2 | |
Oracle GraalVM | =19.3.4 | |
Oracle GraalVM | =20.3.0 | |
Oracle HTTP Server | =12.2.1.4.0 | |
Oracle Jd Edwards Enterpriseone Tools | <9.2.5.3 | |
Oracle Jd Edwards World Security | =a9.4 | |
Oracle MySQL | <=8.0.22 | |
Oracle Mysql Server | <=5.7.32 | |
Oracle Mysql Server | >=8.0.15<=8.0.22 | |
Oracle PeopleSoft Enterprise PeopleTools | =8.56 | |
Oracle PeopleSoft Enterprise PeopleTools | =8.57 | |
Oracle PeopleSoft Enterprise PeopleTools | =8.58 | |
Netapp Active Iq Unified Manager Vmware Vsphere | ||
Netapp Active Iq Unified Manager Windows | ||
Netapp Clustered Data Ontap Antivirus Connector | ||
Netapp Data Ontap 7-mode | ||
NetApp E-Series SANtricity OS Controller | >=11.0.0<=11.60.3 | |
Netapp Hci Management Node | ||
Netapp Manageability Software Development Kit | ||
NetApp OnCommand Insight | ||
NetApp OnCommand Workflow Automation | ||
Netapp Plug-in For Symantec Netbackup | ||
Netapp Santricity Smi-s Provider | ||
Netapp Snapcenter | ||
Netapp Solidfire | ||
Netapp Hci Compute Node | ||
Netapp Hci Storage Node | ||
Netapp Ef600a Firmware | ||
Netapp Ef600a | ||
Netapp Aff A250 Firmware | ||
Netapp Aff A250 | ||
Tenable Log Correlation Engine | <6.0.9 | |
Tenable Nessus Network Monitor | <5.13.1 | |
Siemens Sinec Infrastructure Network Services | <1.0.1.1 | |
Nodejs Node.js | >=10.0.0<=10.12.0 | |
Nodejs Node.js | >=10.13.0<10.23.1 | |
Nodejs Node.js | >=12.0.0<=12.12.0 | |
Nodejs Node.js | >=12.13.0<12.20.1 | |
Nodejs Node.js | >=14.0.0<=14.14.0 | |
Nodejs Node.js | >=14.15.0<14.15.4 | |
Nodejs Node.js | >=15.0.0<15.5.0 | |
redhat/openssl | <1.1.1 | 1.1.1 |
All of | ||
Netapp Ef600a Firmware | ||
Netapp Ef600a | ||
All of | ||
Netapp Aff A250 Firmware | ||
Netapp Aff A250 | ||
IBM Security Verify Bridge | <=All | |
debian/openssl | 1.1.1w-0+deb11u1 1.1.1w-0+deb11u2 3.0.15-1~deb12u1 3.0.14-1~deb12u2 3.3.2-2 |
Applications not using the GENERAL_NAME_cmp of openssl are not vulnerable to this flaw. Even when this function is used, if the attacker can control both the arguments of this function, only then the attacker could trigger a crash.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)