While parsing an IPAddressFamily extension in an X.509 certificate, it is possible to do a one-byte overread. This would result in an incorrect text display of the certificate. This bug has been present since 2006 and is present in all versions of OpenSSL before 1.0.2m and 1.1.0g.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-1157-1 | openssl security update |
Debian DSA |
DSA-4017-1 | openssl1.0 security update |
Debian DSA |
DSA-4018-1 | openssl security update |
Ubuntu USN |
USN-3475-1 | OpenSSL vulnerabilities |
Ubuntu USN |
USN-3611-2 | OpenSSL vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Mon, 14 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Status: PUBLISHED
Assigner: openssl
Published:
Updated: 2024-09-16T21:08:28.987Z
Reserved: 2016-12-16T00:00:00
Link: CVE-2017-3735
No data.
Status : Deferred
Published: 2017-08-28T19:29:01.353
Modified: 2025-04-20T01:37:25.860
Link: CVE-2017-3735
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
Ubuntu USN