First published: Mon Nov 06 2017(Updated: )
It was discovered that OpenSSL incorrectly parsed the IPAddressFamily extension in X.509 certificates, resulting in an erroneous display of the certificate in text format. (CVE-2017-3735) It was discovered that OpenSSL incorrectly performed the x86_64 Montgomery squaring procedure. While unlikely, a remote attacker could possibly use this issue to recover private keys. This issue only applied to Ubuntu 16.04 LTS, Ubuntu 16.10 and Ubuntu 17.04. (CVE-2017-3736)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/libssl1.0.0 | <1.0.2g-1ubuntu13.2 | 1.0.2g-1ubuntu13.2 |
=17.10 | ||
All of | ||
ubuntu/libssl1.0.0 | <1.0.2g-1ubuntu11.3 | 1.0.2g-1ubuntu11.3 |
=17.04 | ||
All of | ||
ubuntu/libssl1.0.0 | <1.0.2g-1ubuntu4.9 | 1.0.2g-1ubuntu4.9 |
=16.04 | ||
All of | ||
ubuntu/libssl1.0.0 | <1.0.1f-1ubuntu2.23 | 1.0.1f-1ubuntu2.23 |
=14.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this advisory is CVE-2017-3735.
The severity of CVE-2017-3735 is not specified in the advisory.
CVE-2017-3735 impacts OpenSSL by causing incorrect parsing of the IPAddressFamily extension in X.509 certificates, resulting in an erroneous display of the certificate in text format.
Versions 1.0.2g-1ubuntu13.2, 1.0.2g-1ubuntu11.3, 1.0.2g-1ubuntu4.9, and 1.0.1f-1ubuntu2.23 of libssl1.0.0 are affected by CVE-2017-3735.
Yes, there is a fix available for CVE-2017-3735. Update libssl1.0.0 to version 1.0.2g-1ubuntu13.2 or later, depending on your Ubuntu version.