OpenSSL Read buffer overruns processing ASN.1 strings (CVE-2021-3712)

Advisory ID CVE Number Date discovered Severity Advisory revision
STORM-2021-060 CVE-2021-3712 10/01/2021 medium v1

Vulnerability details

A vulnerability has been identified on OpenSSL

A bug in the printing of ASN1_STRING on OpenSSL can allow an attacker with a formed ANS1_STRING that don’t end with a NUL value could cause a buffer overflow et could crash the application or cause an arbitrary leak of information

Impacted products

ProductsSeverityDetail
Stormshield Management Center medium A vulnerability has been identified on OpenSSL

Revisions

Version Date Description
v1  04/10/2021 Initial release

 



Stormshield Management Center

CVSS v3.1 Overall Score: 4.6      

Analysis

Impacted version

A bug in the printing of ASN1_STRING on OpenSSL can allow an attacker with a formed ANS1_STRING that don’t end with a NUL value could cause a buffer overflow et could crash the application or cause an arbitrary leak of information

  • SMC 3.0.2 and lower

Workaround solution

Solution

There is no workaround solution.

The 3.1.0 update fixes this vulnerability.



Attack Vector Attack Complexity Privileges Required User Interaction Scope Confidentiality Impact Integrity Impact Availability impact
Network High None None Unchanged Low None Low
CVSS Base score: 4.8 CVSS Vector: (AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L)
Exploit Code Maturity Remediation Level Report Confidence
Unproven that exploit exists Official fix Confirmed
CVSS Temporal score: 4.2 CVSS Vector: (AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L/E:U/RL:O/RC:C)
Confidentiality Requirement Integrity Requirement Availability Requirement
Medium High High
CVSS Environmental score: 4.6 CVSS Vector: (AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L/E:U/RL:O/RC:C/CR:M/IR:H/AR:H/MAV:X/MAC:X/MPR:X/MUI:X/MS:X/MC:X/MI:X/MA:X)