cvelist/2017/3xxx/CVE-2017-3735.json

71 lines
2.0 KiB
JSON
Raw Normal View History

2017-10-16 12:31:07 -04:00
{
"CVE_data_meta" : {
"ASSIGNER" : "openssl-security@openssl.org",
"DATE_PUBLIC" : "2017-08-28T00:00:00",
2017-10-16 12:31:07 -04:00
"ID" : "CVE-2017-3735",
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "OpenSSL",
2017-10-16 12:31:07 -04:00
"version" : {
"version_data" : [
{
"version_value" : "1.1.0"
},
{
"version_value" : "1.0.2"
2017-10-16 12:31:07 -04:00
}
]
}
}
]
},
"vendor_name" : "OpenSSL Software Foundation"
2017-10-16 12:31:07 -04:00
}
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
2017-11-02 14:03:51 -04:00
"value" : "While parsing an IPAddressFamily extension in an X.509 certificate, it is possible to do a one-byte overread. This would result in an incorrect text display of the certificate. This bug has been present since 2006 and is present in all versions of OpenSSL before 1.0.2m and 1.1.0g."
2017-10-16 12:31:07 -04:00
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "out of bounds read"
2017-10-16 12:31:07 -04:00
}
]
}
]
},
"references" : {
"reference_data" : [
{
"url" : "https://www.openssl.org/news/secadv/20170828.txt"
},
2017-11-02 13:03:36 -04:00
{
"url" : "https://www.openssl.org/news/secadv/20171102.txt"
},
2017-10-16 12:31:07 -04:00
{
"url" : "http://www.securityfocus.com/bid/100515"
}
]
}
}