First published: Tue Dec 08 2020(Updated: )
David Benjamin discovered that OpenSSL incorrectly handled comparing certificates containing a EDIPartyName name type. A remote attacker could possibly use this issue to cause OpenSSL to crash, resulting in a denial of service.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/libssl1.1 | <1.1.1f-1ubuntu4.1 | 1.1.1f-1ubuntu4.1 |
Ubuntu | =20.10 | |
All of | ||
ubuntu/libssl1.1 | <1.1.1f-1ubuntu2.1 | 1.1.1f-1ubuntu2.1 |
Ubuntu | =20.04 | |
All of | ||
ubuntu/libssl1.0.0 | <1.0.2n-1ubuntu5.5 | 1.0.2n-1ubuntu5.5 |
Ubuntu | =18.04 | |
All of | ||
ubuntu/libssl1.1 | <1.1.1-1ubuntu2.1~18.04.7 | 1.1.1-1ubuntu2.1~18.04.7 |
Ubuntu | =18.04 | |
All of | ||
ubuntu/libssl1.0.0 | <1.0.2g-1ubuntu4.18 | 1.0.2g-1ubuntu4.18 |
Ubuntu | =16.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The USN-4662-1 vulnerability has a severity rating that suggests it could lead to a denial of service if exploited.
To fix USN-4662-1, update OpenSSL to the recommended version for your specific Ubuntu release.
USN-4662-1 affects Ubuntu versions 16.04, 18.04, 20.04, and 20.10.
No, USN-4662-1 does not allow remote code execution; it primarily leads to a denial of service.
You can identify if your system is vulnerable to USN-4662-1 by checking the version of the libssl package installed on your Ubuntu system.