Description
While parsing an IPAddressFamily extension in an X.509 certificate, it is possible to do a one-byte overread. This would result in an incorrect text display of the certificate. This bug has been present since 2006 and is present in all versions of OpenSSL before 1.0.2m and 1.1.0g.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-1157-1 | openssl security update |
Debian DSA |
DSA-4017-1 | openssl1.0 security update |
Debian DSA |
DSA-4018-1 | openssl security update |
Ubuntu USN |
USN-3475-1 | OpenSSL vulnerabilities |
Ubuntu USN |
USN-3611-2 | OpenSSL vulnerabilities |
References
History
Mon, 14 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Status: PUBLISHED
Assigner: openssl
Published:
Updated: 2024-09-16T21:08:28.987Z
Reserved: 2016-12-16T00:00:00.000Z
Link: CVE-2017-3735
No data.
Status : Deferred
Published: 2017-08-28T19:29:01.353
Modified: 2025-04-20T01:37:25.860
Link: CVE-2017-3735
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
Ubuntu USN