CVE-2020-1971

Description from NVD

The X.509 GeneralName type is a generic type for representing different types of names. One of those name types is known as EDIPartyName. OpenSSL provides a function GENERAL_NAME_cmp which compares different instances of a GENERAL_NAME to see if they are equal or not. This function behaves incorrectly when both GENERAL_NAMEs contain an EDIPARTYNAME. A NULL pointer dereference and a crash may occur leading to a possible denial of service attack. OpenSSL itself uses the GENERAL_NAME_cmp function for two purposes: 1) Comparing CRL distribution point names between an available CRL and a CRL distribution point embedded in an X509 certificate 2) When verifying that a timestamp response token signer matches the timestamp authority name (exposed via the API functions TS_RESP_verify_response and TS_RESP_verify_token) If an attacker can control both items being compared then that attacker could trigger a crash. For example if the attacker can trick a client or server into checking a malicious certificate against a malicious CRL then this may occur. Note that some applications automatically download CRLs based on a URL embedded in a certificate. This checking happens prior to the signatures on the certificate and CRL being verified. OpenSSL's s_server, s_client and verify tools have support for the "-crl_download" option which implements automatic CRL downloading and this attack has been demonstrated to work against those tools. Note that an unrelated bug means that affected versions of OpenSSL cannot parse or construct correct encodings of EDIPARTYNAME. However it is possible to construct a malformed EDIPARTYNAME that OpenSSL's parser will accept and hence trigger this attack. All OpenSSL 1.1.1 and 1.0.2 versions are affected by this issue. Other OpenSSL releases are out of support and have not been checked. Fixed in OpenSSL 1.1.1i (Affected 1.1.1-1.1.1h). Fixed in OpenSSL 1.0.2x (Affected 1.0.2-1.0.2w).

Information Acquisition Date:2021-04-27T11:01Z
CVSS 2.0: 4.3 MEDIUM CVSS 3.x: 5.9 MEDIUM

▼ CVSS3 Vec CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H

▼ CVSS2 Vec AV:N/AC:M/Au:N/C:N/I:N/A:P

NVD References

 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2154ab83e14ede338d2ede9bbe5cdfce5d5a6c9e
     source:CONFIRM
     tags:Broken Link    
 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=f960d81215ebf3f65e03d4d5d857fb9b666d6920
     source:CONFIRM
     tags:Patch    Vendor Advisory    
 https://www.openssl.org/news/secadv/20201208.txt
     source:CONFIRM
     tags:Vendor Advisory    
 DSA-4807
     source:DEBIAN
     tags:Third Party Advisory    
 FreeBSD-SA-20:33
     source:FREEBSD
     tags:Third Party Advisory    
 [debian-lts-announce] 20201214 [SECURITY] [DLA 2493-1] openssl1.0 security update
     source:MLIST
     tags:Mailing List    Third Party Advisory    
 [debian-lts-announce] 20201214 [SECURITY] [DLA 2492-1] openssl security update
     source:MLIST
     tags:Mailing List    Third Party Advisory    
 FEDORA-2020-ef1870065a
     source:FEDORA
     tags:Third Party Advisory    
 [pulsar-commits] 20201216 [GitHub] [pulsar] phijohns-tibco opened a new issue #8978: OpenSSL needs to be updated to 1.1.1i current version is unsupported.
     source:MLIST
     tags:Third Party Advisory    
 https://security.netapp.com/advisory/ntap-20201218-0005/
     source:CONFIRM
     tags:Third Party Advisory    
 FEDORA-2020-a31b01e945
     source:FEDORA
     tags:Third Party Advisory    
 https://www.tenable.com/security/tns-2020-11
     source:CONFIRM
     tags:Third Party Advisory    
 GLSA-202012-13
     source:GENTOO
     tags:Third Party Advisory    
 https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44676
     source:CONFIRM
     tags:Third Party Advisory    
 https://www.oracle.com/security-alerts/cpujan2021.html
     source:MISC
     tags:Third Party Advisory    
 [tomcat-dev] 20210207 [Bug 65126] New: A security vulnerability cve-2020-1971 in Tomcat dependency Library in version 9.0.40.
     source:MLIST
     tags:Mailing List    Third Party Advisory    

Refer to Information on External Sites

CVE InfomationExploits or more Infomation
mitreEXPLOIT DATABASE
NVD0day.today
vulmon.comgithub
CVE DetailsTwitter
JVN ENG JPN
Reconshell

Software Tag: OpenSSL(1 tweets)



List of frequently cited URLs

URLNum of Times Referred to
https://alerts.vulmon.com/l/n2281
https://security.sios.com/vulnerability/openssl-security-vu...136
https://www.openssl.org/news/secadv/20201208.txt17
https://news.ycombinator.com/item?id=253461337
https://git.openssl.org/gitweb/?p=openssl.git4
https://www.bleepingcomputer.com/news/security/dhs-cisa-urg...4
https://ift.tt/37J8ZhT3
https://www.jpcert.or.jp/at/2020/at200048.html3
https://access.redhat.com/security/cve/cve-2020-19713

Information from Twitter

User URL Info Source Date
threatintelctr https://nvd.nist.gov/vuln/detail/CVE-2020-1971 Source threatintelctr   1564352729333514243 2022/08/30
RemotelyAlerts http://alerts.remotelyrmm.com/CVE-2020-1971 Source RemotelyAlerts   1564364969545584641 2022/08/30

List of frequently cited URLs

URLNum of Times Referred to
alerts.vulmon.com281
security.sios.com136
www.openssl.org17
news.ycombinator.com7
git.openssl.org4
www.bleepingcomputer.com4
ift.tt3
www.jpcert.or.jp3
access.redhat.com3

Information from Twitter

User URL Info Source
threatintelctr nvd.nist.gov Show Tweet
RemotelyAlerts alerts.remotelyrmm.com Show Tweet

GitHub Search Results: Up to 10
NameURL
MBHudson/CVE-2020-1971 https://github.com/MBHudson/CVE-2020-1971
Metztli/debian-openssl-1.1.1i https://github.com/Metztli/debian-openssl-1.1.1i

GitHub Search Results: Up to 10
NameURL
MBHudson/CVE-2020-1971 github.com
Metztli/debian-openssl-1.1.1i github.com

2022/08/30 Score : 2
Added Har-sia Database : 2020/12/08
Last Modified : 2022/08/30
Highest Scored Date : 2020/12/09
Highest Score : 73