CWE
119 120 131 787
Advisory Published
CVE Published
CVE Published
Advisory Published
Updated

CVE-2021-3711: SM2 Decryption Buffer Overflow

First published: Thu Aug 19 2021(Updated: )

A flaw was found in openssl. A miscalculation of a buffer size was found in openssl's SM2 decryption function, allowing up to 62 arbitrary bytes to be written outside of the buffer. A remote attacker could use this flaw to crash an application supporting SM2 signature or encryption algorithm, or, possibly, execute arbitrary code with the permissions of the user running that application. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

Credit: openssl-security@openssl.org openssl-security@openssl.org

Affected SoftwareAffected VersionHow to fix
redhat/openssl<1.1.1
1.1.1
OpenSSL OpenSSL>=1.1.1<1.1.1l
Debian Debian Linux=10.0
Debian Debian Linux=11.0
Netapp Active Iq Unified Manager Vmware Vsphere
Netapp Active Iq Unified Manager Windows
NetApp Clustered Data ONTAP
Netapp Clustered Data Ontap Antivirus Connector
NetApp E-Series SANtricity OS Controller>=11.0<=11.50.2
Netapp Hci Management Node
Netapp Manageability Software Development Kit
NetApp OnCommand Insight
NetApp OnCommand Workflow Automation
Netapp Santricity Smi-s Provider
Netapp Snapcenter
Netapp Solidfire
Netapp Storage Encryption
Oracle Communications Cloud Native Core Security Edge Protection Proxy=1.7.0
Oracle Communications Cloud Native Core Unified Data Repository=1.15.0
Oracle Communications Session Border Controller=8.4
Oracle Communications Session Border Controller=9.0
Oracle Communications Unified Session Manager=8.2.5
Oracle Communications Unified Session Manager=8.4.5
Oracle Enterprise Communications Broker=3.2.0
Oracle Enterprise Communications Broker=3.3.0
Oracle Enterprise Session Border Controller=8.4
Oracle Enterprise Session Border Controller=9.0
Oracle Essbase<11.1.2.4.47
Oracle Essbase>=21.1<21.3
Oracle Health Sciences Inform Publisher=6.2.1.1
Oracle Health Sciences Inform Publisher=6.3.1.1
Oracle Jd Edwards Enterpriseone Tools<9.2.6.3
Oracle Jd Edwards World Security=a9.4
Oracle Mysql Connectors<=8.0.27
Oracle Mysql Enterprise Monitor<=8.0.25
Oracle Mysql Server>=5.7.0<=5.7.35
Oracle Mysql Server>=8.0.0<=8.0.26
Oracle PeopleSoft Enterprise PeopleTools=8.57
Oracle PeopleSoft Enterprise PeopleTools=8.58
Oracle PeopleSoft Enterprise PeopleTools=8.59
Oracle ZFS Storage Appliance Kit=8.8
Tenable Nessus Network Monitor<=5.13.1
Tenable Tenable.sc>=5.16.0<=5.19.1
rust/openssl-src<111.16.0
111.16.0
IBM Cognos Analytics 11.2.x<=IBM Cognos Analytics 11.2.x
IBM Cognos Analytics 11.1.x<=IBM Cognos Analytics 11.1.x
debian/openssl
1.1.1w-0+deb11u1
1.1.1w-0+deb11u2
3.0.15-1~deb12u1
3.0.14-1~deb12u2
3.3.2-2

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Reference Links

Parent vulnerabilities

(Appears in the following advisories)

Frequently Asked Questions

  • What is the vulnerability ID for this OpenSSL vulnerability?

    The vulnerability ID for this OpenSSL vulnerability is CVE-2021-3711.

  • What is the severity level of CVE-2021-3711?

    CVE-2021-3711 has a severity level of critical.

  • Which software versions are affected by CVE-2021-3711?

    CVE-2021-3711 affects OpenSSL versions 1.1.1 and earlier, IBM Cognos Analytics 11.2.x, IBM Cognos Analytics 11.1.x, and various other software products.

  • How can I fix this vulnerability?

    To fix CVE-2021-3711, upgrade to OpenSSL version 1.1.1n or later.

  • Where can I find more information about CVE-2021-3711?

    More information about CVE-2021-3711 can be found in the references: [link1](https://github.com/openssl/openssl/commit/59f5e75f3bced8fc0e130d72a3f582cf7b480b46), [link2](https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=1997212), [link3](https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=1997210).

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203