CVE-2021-3712

Related Vulnerabilities: CVE-2021-3712  

It was found that openssl assumed ASN.1 strings to be NUL terminated. A malicious actor may be able to force an application into calling openssl function with a specially crafted, non-NUL terminated string to deliberately hit this bug, which may result in a crash of the application, causing a Denial of Service attack, or possibly, memory disclosure. The highest threat from this vulnerability is to data confidentiality and system availability.

Description

It was found that openssl assumed ASN.1 strings to be NUL terminated. A malicious actor may be able to force an application into calling openssl function with a specially crafted, non-NUL terminated string to deliberately hit this bug, which may result in a crash of the application, causing a Denial of Service attack, or possibly, memory disclosure. The highest threat from this vulnerability is to data confidentiality and system availability.

Statement

The following Red Hat products do not ship the affected OpenSSL component but rely on the Red Hat Enterprise Linux to consume them: * Red Hat Satellite * Red Hat Update Infrastructure * Red Hat CloudForms The Red Hat Advanced Cluster Management for Kubernetes is using the vulnerable version of the library, however the vulnerable code path is not reachable.

The following Red Hat products do not ship the affected OpenSSL component but rely on the Red Hat Enterprise Linux to consume them:

  • Red Hat Satellite
  • Red Hat Update Infrastructure
  • Red Hat CloudForms

The Red Hat Advanced Cluster Management for Kubernetes is using the vulnerable version of the library, however the vulnerable code path is not reachable.

Additional Information

  • Bugzilla 1995634: CVE-2021-3712 openssl: Read buffer overruns processing ASN.1 strings
  • CWE-125: Out-of-bounds Read
  • FAQ: Frequently asked questions about CVE-2021-3712