CVE-2017-3731

Impact:
Moderate
Public Date:
2017-01-26
CWE:
CWE-190->CWE-125
Bugzilla:
1416852: CVE-2017-3731 openssl: Truncated packet could crash via OOB read
An integer underflow leading to an out of bounds read flaw was found in OpenSSL. A remote attacker could possibly use this flaw to crash a 32-bit TLS/SSL server or client using OpenSSL if it used the RC4-MD5 cipher suite.

Find out more about CVE-2017-3731 from the MITRE CVE dictionary dictionary and NIST NVD.

CVSS v3 metrics

CVSS3 Base Score 5.9
CVSS3 Base Metrics CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
Attack Vector Network
Attack Complexity High
Privileges Required None
User Interaction None
Scope Unchanged
Confidentiality None
Integrity Impact None
Availability Impact High

Red Hat Security Errata

Platform Errata Release Date
Red Hat Enterprise Linux 7 (openssl) RHSA-2017:0286 2017-02-20
Red Hat Enterprise Linux 6 (openssl) RHSA-2017:0286 2017-02-20

Affected Packages State

Platform Package State
Red Hat JBoss Web Server 3 openssl Fix deferred
Red Hat JBoss EWS 2 openssl Affected
Red Hat JBoss EWS 1 openssl Not affected
Red Hat JBoss EAP 6 openssl Affected
Red Hat JBoss EAP 5 openssl Not affected
Red Hat JBoss Core Services 1 openssl Affected
Red Hat Enterprise Linux 7 openssl098e Not affected
Red Hat Enterprise Linux 7 OVMF Will not fix
Red Hat Enterprise Linux 6 openssl098e Not affected
Red Hat Enterprise Linux 5 openssl097a Not affected
Red Hat Enterprise Linux 5 openssl Not affected
RHEV-M for Servers mingw-virt-viewer Will not fix

External References

Last Modified