CVE-2021-3449

MEDIUM
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

An OpenSSL TLS server may crash if sent a maliciously crafted renegotiation ClientHello message from a client. If a TLSv1.2 renegotiation ClientHello omits the signature_algorithms extension (where it was present in the initial ClientHello), but includes a signature_algorithms_cert extension then a NULL pointer dereference will result, leading to a crash and a denial of service attack. A server is only vulnerable if it has TLSv1.2 and renegotiation enabled (which is the default configuration). OpenSSL TLS clients are not impacted by this issue. All OpenSSL 1.1.1 versions are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1-1.1.1j).

References

https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=fb9fa6b51defd48157eeb207f52181f735d96148

https://www.openssl.org/news/secadv/20210325.txt

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd

https://www.debian.org/security/2021/dsa-4875

https://security.netapp.com/advisory/ntap-20210326-0006/

https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc

http://www.openwall.com/lists/oss-security/2021/03/27/1

http://www.openwall.com/lists/oss-security/2021/03/27/2

http://www.openwall.com/lists/oss-security/2021/03/28/3

http://www.openwall.com/lists/oss-security/2021/03/28/4

https://security.gentoo.org/glsa/202103-03

https://www.tenable.com/security/tns-2021-06

https://www.tenable.com/security/tns-2021-05

https://lists.fedoraproject.org/archives/list/[email protected]/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/

https://kc.mcafee.com/corporate/index?page=content&id=SB10356

https://www.tenable.com/security/tns-2021-09

https://security.netapp.com/advisory/ntap-20210513-0002/

https://www.tenable.com/security/tns-2021-10

https://www.oracle.com/security-alerts/cpuApr2021.html

Details

Source: MITRE

Published: 2021-03-25

Updated: 2021-06-14

Type: CWE-476

Risk Information

CVSS v2

Base Score: 4.3

Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P

Impact Score: 2.9

Exploitability Score: 8.6

Severity: MEDIUM

CVSS v3

Base Score: 5.9

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H

Impact Score: 3.6

Exploitability Score: 2.2

Severity: MEDIUM

Vulnerable Software

Configuration 1

OR

cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*

Configuration 2

OR

cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

Configuration 3

OR

cpe:2.3:o:freebsd:freebsd:12.2:-:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:12.2:p1:*:*:*:*:*:*

cpe:2.3:o:freebsd:freebsd:12.2:p2:*:*:*:*:*:*

Configuration 4

OR

cpe:2.3:a:netapp:cloud_volumes_ontap_mediator:-:*:*:*:*:*:*:*

cpe:2.3:a:netapp:e-series_performance_analyzer:-:*:*:*:*:*:*:*

cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*

cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*

cpe:2.3:a:netapp:santricity_smi-s_provider:-:*:*:*:*:*:*:*

cpe:2.3:a:netapp:storagegrid:-:*:*:*:*:*:*:*

Configuration 5

OR

cpe:2.3:a:tenable:nessus:*:*:*:*:*:*:*:* versions up to 8.13.1 (inclusive)

cpe:2.3:a:tenable:tenable.sc:*:*:*:*:*:*:*:* versions from 5.13.0 to 5.17.0 (inclusive)

Configuration 6

OR

cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*

Configuration 7

OR

cpe:2.3:a:mcafee:web_gateway:8.2.19:*:*:*:*:*:*:*

cpe:2.3:a:mcafee:web_gateway:9.2.10:*:*:*:*:*:*:*

cpe:2.3:a:mcafee:web_gateway:10.1.1:*:*:*:*:*:*:*

cpe:2.3:a:mcafee:web_gateway_cloud_service:8.2.19:*:*:*:*:*:*:*

cpe:2.3:a:mcafee:web_gateway_cloud_service:9.2.10:*:*:*:*:*:*:*

cpe:2.3:a:mcafee:web_gateway_cloud_service:10.1.1:*:*:*:*:*:*:*

Configuration 8

AND

OR

cpe:2.3:o:checkpoint:quantum_security_management_firmware:r80.40:*:*:*:*:*:*:*

cpe:2.3:o:checkpoint:quantum_security_management_firmware:r81:*:*:*:*:*:*:*

OR

cpe:2.3:h:checkpoint:quantum_security_management:-:*:*:*:*:*:*:*

Configuration 9

AND

OR

cpe:2.3:o:checkpoint:multi-domain_management_firmware:r80.40:*:*:*:*:*:*:*

cpe:2.3:o:checkpoint:multi-domain_management_firmware:r81:*:*:*:*:*:*:*

OR

cpe:2.3:h:checkpoint:multi-domain_management:-:*:*:*:*:*:*:*

Configuration 10

AND

OR

cpe:2.3:o:checkpoint:quantum_security_gateway_firmware:r80.40:*:*:*:*:*:*:*

cpe:2.3:o:checkpoint:quantum_security_gateway_firmware:r81:*:*:*:*:*:*:*

OR

cpe:2.3:h:checkpoint:quantum_security_gateway:-:*:*:*:*:*:*:*

Tenable Plugins

View all (33 total)

IDNameProductFamilySeverity
150252EulerOS Virtualization 2.9.0 : openssl (EulerOS-SA-2021-1970)NessusHuawei Local Security Checks
medium
150247EulerOS Virtualization 2.9.1 : openssl (EulerOS-SA-2021-1960)NessusHuawei Local Security Checks
medium
150139Tenable Log Correlation Engine (LCE) < 6.0.9 (TNS-2021-10)NessusMisc.
medium
149403Nessus Network Monitor < 5.13.1 Multiple Vulnerabilities (TNS-2021-09)NessusMisc.
high
148937MySQL 8.0.x < 8.0.24 Multiple Vulnerabilities (Apr 2021 CPU)NessusDatabases
medium
148936MySQL 5.7.x < 5.7.34 Multiple Vulnerabilities (Apr 2021 CPU)NessusDatabases
medium
148869FreeBSD : MySQL -- Multiple vulnerabilities (56ba4513-a1be-11eb-9072-d4c9ef517024)NessusFreeBSD Local Security Checks
high
148568RHEL 7 : Red Hat JBoss Core Services Apache HTTP Server 2.4.37 SP7 (RHSA-2021:1199)NessusRed Hat Local Security Checks
high
148563RHEL 7 : Red Hat JBoss Web Server 3.1 Service Pack 12 (RHSA-2021:1202)NessusRed Hat Local Security Checks
high
148562RHEL 7 / 8 : Red Hat JBoss Web Server 5.4.2 Security Update (Important) (RHSA-2021:1195)NessusRed Hat Local Security Checks
high
148547Oracle Linux 8 : openssl (ELSA-2021-1024)NessusOracle Linux Local Security Checks
high
148542RHEL 8 : Red Hat Virtualization (RHSA-2021:1189)NessusRed Hat Local Security Checks
high
148534FreeBSD : Node.js -- April 2021 Security Releases (c0c1834c-9761-11eb-acfd-0022489ad614)NessusFreeBSD Local Security Checks
high
148404Tenable.sc 5.16.0 / 5.17.0 OpenSSL DoS (TNS-2021-06)NessusMisc.
medium
148379RHEL 8 : openssl (RHSA-2021:1131)NessusRed Hat Local Security Checks
medium
148355Photon OS 4.0: Openssl PHSA-2021-4.0-0007NessusPhotonOS Local Security Checks
high
148317RHEL 8 : openssl (RHSA-2021:1063)NessusRed Hat Local Security Checks
medium
148297Tenable Nessus 8.9.0 < 8.13.2 Multiple Vulnerabilities (TNS-2021-05)NessusMisc.
high
148281CentOS 8 : openssl (CESA-2021:1024)NessusCentOS Local Security Checks
high
148280Tenable SecurityCenter 5.13.x < 5.18.0 DoS (TNS-2021-06)NessusMisc.
medium
148271GLSA-202103-03 : OpenSSL: Multiple vulnerabilitiesNessusGentoo Local Security Checks
high
148259Oracle Linux 8 : openssl (ELSA-2021-9151) (deprecated)NessusOracle Linux Local Security Checks
high
148249RHEL 8 : openssl (RHSA-2021:1024)NessusRed Hat Local Security Checks
high
148200FreeBSD : OpenSSL -- Multiple vulnerabilities (5a668ab3-8d86-11eb-b8d6-d4c9ef517024)NessusFreeBSD Local Security Checks
high
148196Amazon Linux 2 : openssl11 (ALAS-2021-1622)NessusAmazon Linux Local Security Checks
high
148192Photon OS 3.0: Nxtgn PHSA-2021-3.0-0210NessusPhotonOS Local Security Checks
high
148186Photon OS 2.0: Nxtgn PHSA-2021-2.0-0331NessusPhotonOS Local Security Checks
high
148176openSUSE Security Update : openssl-1_1 (openSUSE-2021-476)NessusSuSE Local Security Checks
medium
148170Debian DSA-4875-1 : openssl - security updateNessusDebian Local Security Checks
medium
148167SUSE SLED15 / SLES15 Security Update : openssl-1_1 (SUSE-SU-2021:0955-1)NessusSuSE Local Security Checks
medium
148150SUSE SLES12 Security Update : openssl-1_1 (SUSE-SU-2021:0954-1)NessusSuSE Local Security Checks
medium
148130Ubuntu 18.04 LTS / 20.04 LTS / 20.10 : OpenSSL vulnerability (USN-4891-1)NessusUbuntu Local Security Checks
medium
148125OpenSSL 1.1.1 < 1.1.1k Multiple VulnerabilitiesNessusWeb Servers
high