CVE-2018-0739

Publication date 27 March 2018

Last updated 24 July 2024


Ubuntu priority

Cvss 3 Severity Score

6.5 · Medium

Score breakdown

Constructed ASN.1 types with a recursive definition (such as can be found in PKCS7) could eventually exceed the stack given malicious input with excessive recursion. This could result in a Denial Of Service attack. There are no such structures used within SSL/TLS that come from untrusted sources so this is considered safe. Fixed in OpenSSL 1.1.0h (Affected 1.1.0-1.1.0g). Fixed in OpenSSL 1.0.2o (Affected 1.0.2b-1.0.2n).

Status

Package Ubuntu Release Status
openssl 19.04 disco
Fixed 1.1.0g-2ubuntu3
18.10 cosmic
Fixed 1.1.0g-2ubuntu3
18.04 LTS bionic
Fixed 1.1.0g-2ubuntu3
17.10 artful
Fixed 1.0.2g-1ubuntu13.4
16.04 LTS xenial
Fixed 1.0.2g-1ubuntu4.11
14.04 LTS trusty
Fixed 1.0.1f-1ubuntu2.24
openssl098 19.04 disco Not in release
18.10 cosmic Not in release
18.04 LTS bionic Not in release
17.10 artful Not in release
16.04 LTS xenial Not in release
14.04 LTS trusty Not in release
openssl1.0 19.04 disco Not in release
18.10 cosmic
Fixed 1.0.2n-1ubuntu5
18.04 LTS bionic
Fixed 1.0.2n-1ubuntu5
17.10 artful Not in release
16.04 LTS xenial Not in release
14.04 LTS trusty Not in release

Patch details

For informational purposes only. We recommend not to cherry-pick updates. How can I get the fixes?

Package Patch details
openssl

Severity score breakdown

Parameter Value
Base score 6.5 · Medium
Attack vector Network
Attack complexity Low
Privileges required None
User interaction Required
Scope Unchanged
Confidentiality None
Integrity impact None
Availability impact High
Vector CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

References

Related Ubuntu Security Notices (USN)

Other references