5
CVSSv2

CVE-2017-3730

Published: 04/05/2017 Updated: 25/04/2019
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 505
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

In OpenSSL 1.1.0 prior to 1.1.0d, if a malicious server supplies bad parameters for a DHE or ECDHE key exchange then this can result in the client attempting to dereference a NULL pointer leading to a client crash. This could be exploited in a Denial of Service attack.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

openssl openssl 1.1.0c

openssl openssl 1.1.0

openssl openssl 1.1.0b

openssl openssl 1.1.0a

oracle agile engineering data management 6.2.0

oracle jd edwards world security a9.2

oracle communications eagle lnp application processor 10.1

oracle communications application session controller 3.7.1

oracle jd edwards world security a9.4

oracle jd edwards enterpriseone tools 9.2

oracle communications operations monitor 3.4

oracle communications operations monitor 4.0

oracle agile engineering data management 6.1.3

oracle jd edwards world security a9.1

oracle jd edwards world security a9.3

oracle communications eagle lnp application processor 10.0

oracle communications eagle lnp application processor 10.2

oracle communications application session controller 3.8.0

Vendor Advisories

In OpenSSL 110 before 110d, if a malicious server supplies bad parameters for a DHE or ECDHE key exchange then this can result in the client attempting to dereference a NULL pointer leading to a client crash This could be exploited in a Denial of Service attack ...
On January 26, 2017, the OpenSSL Software Foundation released a security advisory that included three new vulnerabilities The foundation also released one vulnerability that was already disclosed in the OpenSSL advisory for November 2016 and included in the Cisco Security Advisory Multiple Vulnerabilities in OpenSSL Affecting Cisco Products: Novem ...
On January 26, 2017, the OpenSSL Software Foundation released a security advisory that included three new vulnerabilities  If a malicious server supplies bad parameters for a DHE or ECDHE key exchange then this can result in the client attempting to dereference a NULL pointer leading to a client crash This could be exploited in a Denial of S ...

Exploits

// Source: guidovrankenwordpresscom/2017/01/26/cve-2017-3730-openssl-1-1-0-remote-client-denial-of-service-affects-servers-as-well-poc/ /* * SSL server demonstration program * * Copyright (C) 2006-2015, ARM Limited, All Rights Reserved * SPDX-License-Identifier: Apache-20 * * Licensed under the Apache License, Version 20 (the ...
OpenSSL version 110 remote client denial of service proof of concept exploit ...

Github Repositories

OpenSSL CVE-2017-3730 proof-of-concept

CVE-2017-3730 OpenSSL CVE-2017-3730 proof-of-concept Using OpenSSH as a proxy to patch DH values on the fly Create an SSL server using a ciphersuite like DHE-PSK-WITH-AES-256-GCM-SHA384 Let's say it runs on 10022 port 8899 Get openssh-74p1 Apply patch Build it Run it like: /ssh -vvv -N -D 1085 -o TCPKeepAlive=yes -o ServerAliveInterval=60 localhost

Recent Articles

OpenSSL pushes trio of DoS-busting patches
The Register • Richard Chirgwin • 31 Jan 2017

One was fixed before anyone realised it was a security issue, so be careful when applying

OpenSSL's released patches for a trio of denial-of-service bugs. The first (CVE-2017-3731), turned up by Google's Robert Święcki, only affects SSL/TLS servers running on 32-bit hosts. Depending on the cipher the host is using, a truncated packet crashes the system by triggering an out-of-bounds read. It's version-specific: under OpenSSL 1.1.0 the relevant cipher is CHACHA20/POLY1305 and it's fixed in 1.1.0d. In OpenSSL 1.0.2, RC4-MD5 (which should have been disabled) is the target, and it's fi...