Search 187964 CVE descriptions
and 85075 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:
Category:Denial of Service
Title:OpenSSL: Segmentation fault in SSL_check_chain (CVE-2020-1967) (Linux)
Summary:OpenSSL server or client applications are prone to a; denial-of-service vulnerability.
OpenSSL server or client applications are prone to a
denial-of-service vulnerability.

Vulnerability Insight:
Server or client applications that call the SSL_check_chain() function
during or after a TLS 1.3 handshake may crash due to a NULL pointer dereference as a result of incorrect
handling of the 'signature_algorithms_cert' TLS extension. The crash occurs if an invalid or unrecognised
signature algorithm is received from the peer.

Vulnerability Impact:
This could be exploited by a malicious peer in a Denial of
Service attack.

Affected Software/OS:
OpenSSL versions 1.1.1d, 1.1.1e, and 1.1.1f.

This issue does not impact OpenSSL versions prior to 1.1.1d.

Update OpenSSL to version 1.1.1g or later. See the references for more details.

CVSS Score:

CVSS Vector:

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2020-1967;a=commitdiff;h=eb563247aef3e83dda7679c43f9649270462e5b1
Debian Security Information: DSA-4661 (Google Search)
FreeBSD Security Advisory: FreeBSD-SA-20:11
SuSE Security Announcement: openSUSE-SU-2020:0933 (Google Search)
SuSE Security Announcement: openSUSE-SU-2020:0945 (Google Search)
CopyrightCopyright (C) 2020 Greenbone Networks GmbH

This is only one of 85075 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

© 1998-2020 E-Soft Inc. All rights reserved.