Think you have a false positive on this rule?

Sid 1-46418

Message

SERVER-OTHER X.509 IPAddressFamily extension buffer overread attempt

Summary

This event is generated when an attacker attempts to exploit a buffer overread in OpenSSL.

Impact

Attempted Information Leak

CVE-2017-3735:

CVSS base score 5.3

CVSS impact score 1.4

CVSS exploitability score 3.9

Confidentiality Impact NONE

Integrity Impact LOW

Availability Impact NONE

Detailed information

Rule checks for an attempt to exploit a buffer overread when parsing X.509 certificates with a malformed IPAddressFamily extension. CVE-2017-3735: While parsing an IPAddressFamily extension in an X.509 certificate, it is possible to do a one-byte overread. This would result in an incorrect text display of the certificate. This bug has been present since 2006 and is present in all versions of OpenSSL before 1.0.2m and 1.1.0g.

Affected systems

  • openssl openssl 0.9.7j
  • openssl openssl 0.9.7k
  • openssl openssl 0.9.7l
  • openssl openssl 0.9.7m
  • openssl openssl 0.9.8
  • openssl openssl 0.9.8a
  • openssl openssl 0.9.8b
  • openssl openssl 0.9.8c
  • openssl openssl 0.9.8d
  • openssl openssl 0.9.8e
  • openssl openssl 0.9.8f
  • openssl openssl 0.9.8g
  • openssl openssl 0.9.8h
  • openssl openssl 0.9.8i
  • openssl openssl 0.9.8j
  • openssl openssl 0.9.8k
  • openssl openssl 0.9.8l
  • openssl openssl 0.9.8m
  • openssl openssl 0.9.8n
  • openssl openssl 0.9.8o
  • openssl openssl 0.9.8p
  • openssl openssl 0.9.8q
  • openssl openssl 0.9.8r
  • openssl openssl 0.9.8s
  • openssl openssl 0.9.8t
  • openssl openssl 0.9.8u
  • openssl openssl 0.9.8v
  • openssl openssl 0.9.8w
  • openssl openssl 0.9.8x
  • openssl openssl 0.9.8y
  • openssl openssl 0.9.8z
  • openssl openssl 0.9.8za
  • openssl openssl 0.9.8zb
  • openssl openssl 0.9.8zc
  • openssl openssl 0.9.8ze
  • openssl openssl 0.9.8zg
  • openssl openssl 1.0.0
  • openssl openssl 1.0.0a
  • openssl openssl 1.0.0b
  • openssl openssl 1.0.0c
  • openssl openssl 1.0.0d
  • openssl openssl 1.0.0e
  • openssl openssl 1.0.0f
  • openssl openssl 1.0.0g
  • openssl openssl 1.0.0h
  • openssl openssl 1.0.0i
  • openssl openssl 1.0.0j
  • openssl openssl 1.0.0k
  • openssl openssl 1.0.0l
  • openssl openssl 1.0.0m
  • openssl openssl 1.0.0n
  • openssl openssl 1.0.0o
  • openssl openssl 1.0.0p
  • openssl openssl 1.0.0q
  • openssl openssl 1.0.0r
  • openssl openssl 1.0.0s
  • openssl openssl 1.0.1
  • openssl openssl 1.0.1a
  • openssl openssl 1.0.1b
  • openssl openssl 1.0.1c
  • openssl openssl 1.0.1d
  • openssl openssl 1.0.1e
  • openssl openssl 1.0.1f
  • openssl openssl 1.0.1g
  • openssl openssl 1.0.1h
  • openssl openssl 1.0.1i
  • openssl openssl 1.0.1j
  • openssl openssl 1.0.1k
  • openssl openssl 1.0.1l
  • openssl openssl 1.0.2
  • openssl openssl 1.0.2a
  • openssl openssl 1.0.2b
  • openssl openssl 1.0.2c
  • openssl openssl 1.0.2d
  • openssl openssl 1.0.2e
  • openssl openssl 1.0.2f
  • openssl openssl 1.0.2h
  • openssl openssl 1.0.2i
  • openssl openssl 1.0.2j
  • openssl openssl 1.0.2k
  • openssl openssl 1.0.2l
  • openssl openssl 1.1.0
  • openssl openssl 1.1.0a
  • openssl openssl 1.1.0b
  • openssl openssl 1.1.0c
  • openssl openssl 1.1.0d
  • openssl openssl 1.1.0e
  • openssl openssl 1.1.0f
  • debian debian_linux 8.0
  • debian debian_linux 9.0

Ease of attack

Medium

False positives

Not known

False negatives

Not known

Corrective action

OpenSSL 1.1.0 users should upgrade to 1.1.0g OpenSSL 1.0.2 users should upgrade to 1.0.2m

Contributors

  • Cisco's Talos Intelligence Group

Additional References