The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Vulnerability of OpenSSL: NULL pointer dereference via X509_issuer_and_serial_hash

Synthesis of the vulnerability 

An attacker can force a NULL pointer to be dereferenced via X509_issuer_and_serial_hash() of OpenSSL, in order to trigger a denial of service.
Vulnerable systems: Blue Coat CAS, ProxySG par Blue Coat, SGOS by Blue Coat, Broadcom Content Analysis, ProxySG by Symantec, SGOS by Symantec, Debian, AIX, IBM i, Tivoli Storage Manager, MariaDB ~ precise, MySQL Community, MySQL Enterprise, OpenSSL, openSUSE Leap, Percona Server, stunnel, SUSE Linux Enterprise Desktop, SLES, Ubuntu, VxWorks.
Severity of this threat: 2/4.
Creation date: 16/02/2021.
Références of this weakness: 6429603, 6443405, 6445489, CERTFR-2021-AVI-124, CERTFR-2021-AVI-187, cpuapr2021, CVE-2021-23841, DLA-2563-1, DLA-2565-1, DSA-4855-1, openSUSE-SU-2021:0427-1, openSUSE-SU-2021:0430-1, SUSE-SU-2021:0725-1, SUSE-SU-2021:0752-1, SUSE-SU-2021:0753-1, SUSE-SU-2021:0754-1, SUSE-SU-2021:0755-1, SUSE-SU-2021:0769-1, SUSE-SU-2021:0793-1, SUSE-SU-2021:0939-1, SUSE-SU-2021:14667-1, SUSE-SU-2021:14670-1, SYMSA17570, USN-4738-1, USN-4745-1, VIGILANCE-VUL-34598.

Description of the vulnerability 

An attacker can force a NULL pointer to be dereferenced via X509_issuer_and_serial_hash() of OpenSSL, in order to trigger a denial of service.
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

This computer weakness impacts software or systems such as Blue Coat CAS, ProxySG par Blue Coat, SGOS by Blue Coat, Broadcom Content Analysis, ProxySG by Symantec, SGOS by Symantec, Debian, AIX, IBM i, Tivoli Storage Manager, MariaDB ~ precise, MySQL Community, MySQL Enterprise, OpenSSL, openSUSE Leap, Percona Server, stunnel, SUSE Linux Enterprise Desktop, SLES, Ubuntu, VxWorks.

Our Vigil@nce team determined that the severity of this vulnerability note is medium.

The trust level is of type confirmed by the editor, with an origin of document.

An attacker with a expert ability can exploit this cybersecurity threat.

Solutions for this threat 

OpenSSL: version 1.1.1j.
The version 1.1.1j is fixed:
  https://www.openssl.org/

OpenSSL: version 1.0.2y.
The version 1.0.2y is fixed:
  https://www.openssl.org/support/contracts.html#premium

AIX: patch for OpenSSL.
A patch is indicated in information sources.

Broadcom Content Analysis, ProxySG: fixed versions for OpenSSL.
Fixed versions are indicated in information sources.

Debian 10: new openssl packages.
New packages are available:
  Debian 10: openssl 1.1.1d-0+deb10u5

Debian 9: new openssl1.0 packages.
New packages are available:
  Debian 9: openssl1.0 1.0.2u-1~deb9u4

Debian 9: new openssl packages.
New packages are available:
  Debian 9: openssl 1.1.0l-1~deb9u3

IBM i: patch for OpenSSL.
A patch is indicated in information sources.

IBM Spectrum Protect Backup-Archive Client NetApp Services: solution for OpenSSL.
The solution is indicated in information sources.

openSUSE Leap 15.2: new openssl-1_0_0 packages.
New packages are available:
  openSUSE Leap 15.2: openssl-1_0_0 1.0.2p-lp152.8.12.1

openSUSE Leap 15.2: new openssl-1_1 packages.
New packages are available:
  openSUSE Leap 15.2: openssl-1_1 1.1.1d-lp152.7.12.1

Oracle MySQL: version 5.7.34.
The version 5.7.34 is fixed:
  https://support.oracle.com/rs?type=doc&id=2764660.1
  https://www.mysql.com/fr/downloads/
  https://dev.mysql.com/downloads/mysql/

Oracle MySQL: version 8.0.24.
The version 8.0.24 is fixed:
  https://support.oracle.com/rs?type=doc&id=2764660.1
  https://www.mysql.com/fr/downloads/
  https://dev.mysql.com/downloads/mysql/

stunnel: version 5.58.
The version 5.58 is fixed:
  https://www.stunnel.org/downloads.html

SUSE LE 11 SP3: new openssl1 packages.
New packages are available:
  SUSE LE 11 SP3: openssl1 1.0.1g-0.58.33.1

SUSE LE 11 SP3: new openssl packages.
New packages are available:
  SUSE LE 11 SP3: openssl 0.9.8j-0.106.37.1
  SUSE LE 11 SP4: openssl 0.9.8j-0.106.37.1

SUSE LE 12 SP2-3: new openssl packages.
New packages are available:
  SUSE LE 12 SP2: openssl 1.0.2j-60.66.1
  SUSE LE 12 SP3: openssl 1.0.2j-60.66.1

SUSE LE 12 SP2-5: new compat-openssl098 packages.
New packages are available:
  SUSE LE 12 SP2: compat-openssl098 0.9.8j-106.24.1
  SUSE LE 12 SP3: compat-openssl098 0.9.8j-106.24.1
  SUSE LE 12 SP4: compat-openssl098 0.9.8j-106.24.1
  SUSE LE 12 SP5: compat-openssl098 0.9.8j-106.24.1

SUSE LE 12 SP4-5: new openssl-1_0_0 packages.
New packages are available:
  SUSE LE 12 SP4: openssl-1_0_0 1.0.2p-3.36.1
  SUSE LE 12 SP5: openssl-1_0_0 1.0.2p-3.36.1

SUSE LE 12 SP4-5: new openssl-1_1 packages.
New packages are available:
  SUSE LE 12 SP4: openssl-1_1 1.1.1d-2.30.1
  SUSE LE 12 SP5: openssl-1_1 1.1.1d-2.30.1

SUSE LE 15 RTM: new openssl-1_1 packages.
New packages are available:
  SUSE LE 15 RTM: openssl-1_1 1.1.0i-4.57.1

SUSE LE 15 RTM-SP3: new openssl-1_0_0 packages.
New packages are available:
  SUSE LE 15 RTM: openssl-1_0_0 1.0.2p-3.37.1
  SUSE LE 15 SP1: openssl-1_0_0 1.0.2p-3.37.1
  SUSE LE 15 SP2: openssl-1_0_0 1.0.2p-3.37.1
  SUSE LE 15 SP3: openssl-1_0_0 1.0.2p-3.37.1

SUSE LE 15 SP1: new openssl-1_1 packages.
New packages are available:
  SUSE LE 15 SP1: openssl-1_1 1.1.0i-14.15.1

SUSE LE 15 SP2: new openssl-1_1 packages.
New packages are available:
  SUSE LE 15 SP2: openssl-1_1 1.1.1d-11.17.1

Ubuntu 12/14: new libssl1.0.0 packages.
New packages are available:
  Ubuntu 14.04 ESM: libssl1.0.0 1.0.1f-1ubuntu2.27+esm2
  Ubuntu 12.04 ESM: libssl1.0.0 1.0.1-4ubuntu5.45

Ubuntu: new libssl packages.
New packages are available:
  Ubuntu 20.10: libssl1.1 1.1.1f-1ubuntu4.2
  Ubuntu 20.04 LTS: libssl1.1 1.1.1f-1ubuntu2.2
  Ubuntu 18.04 LTS: libssl1.0.0 1.0.2n-1ubuntu5.6, libssl1.1 1.1.1-1ubuntu2.1~18.04.8
  Ubuntu 16.04 LTS: libssl1.0.0 1.0.2g-1ubuntu4.19

VxWorks: version 21.03.
The version 21.03 is fixed:
  https://support.windriver.com/
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

Computer vulnerabilities tracking service 

Vigil@nce provides system vulnerability announces. The technology watch team tracks security threats targeting the computer system.