CERT-In Vulnerability Note
CIVN-2020-0444
NULL pointer dereference Vulnerability in OpenSSL
Original Issue Date:December 21, 2020
Severity Rating: MEDIUM
Software Affected
- OpenSSL versions 1.1.1 and 1.0.2
Overview
A NULL pointer dereference vulnerability has been found in Open SSL which may lead to a possible denial of service(DoS) attack on a server or client application running OpenSSL.
Description
This vulnerability is due to a NULL pointer de-reference error. A remote attacker can trigger denial of service conditions via the API functions viz TS_RESP_verify_response and TS_RESP_verify_token. An attacker could exploit this vulnerability by controlling both items being compared. For example if the attacker can trick a client or server into checking a malicious certificate against a malicious CRL then this may occur.
Successful exploitation of this vulnerability could allow the attacker to perform a denial of service (DoS) attack.
Solution
Upgrade to OpenSSL version 1.1.1i
OpenSSL 1.0.2 and 1.1.0 are out of support and no longer receiving updates. Users of these versions are recommended to upgrade to OpenSSL 1.1.1i.
Vendor Information
OpenSSL
https://www.openssl.org/news/secadv/20201208.txt
References
OpenSSL
https://www.openssl.org/news/secadv/20201208.txt
Security Tracker
https://security-tracker.debian.org/tracker/CVE-2020-1971
CVE Name
CVE-2020-1971
Disclaimer
The information provided herein is on "as is" basis, without warranty of any kind.
Contact Information
Email: info@cert-in.org.in Phone: +91-11-24368572
Postal address
Indian Computer Emergency Response Team (CERT-In) Ministry of Electronics and Information Technology Government of India Electronics Niketan 6, CGO Complex, Lodhi Road, New Delhi - 110 003 India
|