The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Vulnerability of OpenSSL: NULL pointer dereference via signature_algorithms

Synthesis of the vulnerability 

An attacker can force a NULL pointer to be dereferenced via signature_algorithms of OpenSSL, in order to trigger a denial of service.
Vulnerable products: ProxySG par Blue Coat, SGOS by Blue Coat, ProxySG by Symantec, SGOS by Symantec, CheckPoint Security Gateway, CheckPoint Smart-1, Cisco ASR, AsyncOS, IOS XR Cisco, Nexus by Cisco, NX-OS, Prime Infrastructure, Cisco Router, Cisco vEdge, Cisco UCS, Cisco Unified CCX, Cisco IP Phone, Cisco WSA, Debian, Fedora, FreeBSD, hMailServer, IBM i, McAfee Web Gateway, Nodejs Core, OpenSSL, openSUSE Leap, pfSense, Python, RHEL, stunnel, SUSE Linux Enterprise Desktop, SLES, Nessus, Ubuntu.
Severity of this weakness: 3/4.
Creation date: 25/03/2021.
Revision date: 26/03/2021.
Références of this bulletin: 6443733, CERTFR-2021-AVI-221, CERTFR-2021-AVI-235, cisco-sa-openssl-2021-GHY28dJd, CVE-2021-3449, DSA-4875-1, FEDORA-2021-d049f32a82, FEDORA-2021-f347d1c866, FreeBSD-SA-21:07.openssl, openSUSE-SU-2021:0476-1, RHSA-2021:1024-01, RHSA-2021:1063-01, RHSA-2021:1131-01, SB10356, sk172983, SUSE-SU-2021:0954-1, SYMSA17849, TNS-2021-05, USN-4891-1, VIGILANCE-VUL-34944.

Description of the vulnerability 

An attacker can force a NULL pointer to be dereferenced via signature_algorithms...
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

This computer vulnerability impacts software or systems such as ProxySG par Blue Coat, SGOS by Blue Coat, ProxySG by Symantec, SGOS by Symantec, CheckPoint Security Gateway, CheckPoint Smart-1, Cisco ASR, AsyncOS, IOS XR Cisco, Nexus by Cisco, NX-OS, Prime Infrastructure, Cisco Router, Cisco vEdge, Cisco UCS, Cisco Unified CCX, Cisco IP Phone, Cisco WSA, Debian, Fedora, FreeBSD, hMailServer, IBM i, McAfee Web Gateway, Nodejs Core, OpenSSL, openSUSE Leap, pfSense, Python, RHEL, stunnel, SUSE Linux Enterprise Desktop, SLES, Nessus, Ubuntu.

Our Vigil@nce team determined that the severity of this weakness bulletin is important.

The trust level is of type confirmed by the editor, with an origin of internet client.

A proof of concept or an attack tool is available, so your teams have to process this alert. An attacker with a technician ability can exploit this weakness.

Solutions for this threat 

This vulnerability fix will be public soon.
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

Computer vulnerabilities tracking service 

Vigil@nce provides software vulnerability alerts. The Vigil@nce computer vulnerability tracking service alerts your teams of vulnerabilities or threats impacting your information system.