CVE-2017-3737
Detail
Deferred
This CVE record is not being prioritized for NVD enrichment efforts due to resource or other concerns.
Description
OpenSSL 1.0.2 (starting from version 1.0.2b) introduced an "error state" mechanism. The intent was that if a fatal error occurred during a handshake then OpenSSL would move into the error state and would immediately fail if you attempted to continue the handshake. This works as designed for the explicit handshake functions (SSL_do_handshake(), SSL_accept() and SSL_connect()), however due to a bug it does not work correctly if SSL_read() or SSL_write() is called directly. In that scenario, if the handshake fails then a fatal error will be returned in the initial function call. If SSL_read()/SSL_write() is subsequently called by the application for the same SSL object then it will succeed and the data is passed without being decrypted/encrypted directly from the SSL/TLS record layer. In order to exploit this issue an application bug would have to be present that resulted in a call to SSL_read()/SSL_write() being issued after having already received a fatal error. OpenSSL version 1.0.2b-1.0.2m are affected. Fixed in OpenSSL 1.0.2n. OpenSSL 1.1.0 is not affected.
Metrics
CVSS Version 4.0
CVSS Version 3.x
CVSS Version 2.0
NVD enrichment efforts reference publicly available information to associate
vector strings. CVSS information contributed by other sources is also
displayed.
CVSS 4.0 Severity and Vector Strings:
NVD assessment
not yet provided.
CVSS 3.x Severity and Vector Strings:
Vector:
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
CVSS 2.0 Severity and Vector Strings:
Vector:
(AV:N/AC:M/Au:N/C:P/I:N/A:N)
References to Advisories, Solutions, and Tools
By selecting these links, you will be leaving NIST webspace.
We have provided these links to other web sites because they
may have information that would be of interest to you. No
inferences should be drawn on account of other sites being
referenced, or not, from this page. There may be other web
sites that are more appropriate for your purpose. NIST does
not necessarily endorse the views expressed, or concur with
the facts presented on these sites. Further, NIST does not
endorse any commercial products that may be mentioned on
these sites. Please address comments about this page to [email protected] .
URL
Source(s)
Tag(s)
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
CVE, OpenSSL Software Foundation
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
CVE, OpenSSL Software Foundation
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
CVE, OpenSSL Software Foundation
http://www.securityfocus.com/bid/102103
CVE, OpenSSL Software Foundation
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id/1039978
CVE, OpenSSL Software Foundation
Third Party Advisory
VDB Entry
https://access.redhat.com/errata/RHSA-2018:0998
CVE, OpenSSL Software Foundation
https://access.redhat.com/errata/RHSA-2018:2185
CVE, OpenSSL Software Foundation
https://access.redhat.com/errata/RHSA-2018:2186
CVE, OpenSSL Software Foundation
https://access.redhat.com/errata/RHSA-2018:2187
CVE, OpenSSL Software Foundation
https://cert-portal.siemens.com/productcert/pdf/ssa-179516.pdf
CVE, OpenSSL Software Foundation
https://github.com/openssl/openssl/commit/898fb884b706aaeb283de4812340bb0bde8476dc
CVE, OpenSSL Software Foundation
https://security.FreeBSD.org/advisories/FreeBSD-SA-17:12.openssl.asc
CVE, OpenSSL Software Foundation
Third Party Advisory
https://security.gentoo.org/glsa/201712-03
CVE, OpenSSL Software Foundation
Third Party Advisory
https://security.netapp.com/advisory/ntap-20171208-0001/
CVE, OpenSSL Software Foundation
Third Party Advisory
https://security.netapp.com/advisory/ntap-20180117-0002/
CVE, OpenSSL Software Foundation
https://security.netapp.com/advisory/ntap-20180419-0002/
CVE, OpenSSL Software Foundation
https://www.debian.org/security/2017/dsa-4065
CVE, OpenSSL Software Foundation
Third Party Advisory
https://www.digitalmunition.me/2017/12/cve-2017-3737-openssl-security-bypass-vulnerability/
CVE, OpenSSL Software Foundation
Third Party Advisory
https://www.openssl.org/news/secadv/20171207.txt
CVE, OpenSSL Software Foundation
Vendor Advisory
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
CVE, OpenSSL Software Foundation
https://www.tenable.com/security/tns-2017-16
CVE, OpenSSL Software Foundation
Weakness Enumeration
CWE-ID
CWE Name
Source
CWE-125
Out-of-bounds Read
NIST
CWE-787
Out-of-bounds Write
NIST
Change History
20 change records found show changes
CVE Modified by CVE 11/20/2024 10:26:02 PM
Action
Type
Old Value
New Value
Added
Reference
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
Added
Reference
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
Added
Reference
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
Added
Reference
http://www.securityfocus.com/bid/102103
Added
Reference
http://www.securitytracker.com/id/1039978
Added
Reference
https://access.redhat.com/errata/RHSA-2018:0998
Added
Reference
https://access.redhat.com/errata/RHSA-2018:2185
Added
Reference
https://access.redhat.com/errata/RHSA-2018:2186
Added
Reference
https://access.redhat.com/errata/RHSA-2018:2187
Added
Reference
https://cert-portal.siemens.com/productcert/pdf/ssa-179516.pdf
Added
Reference
https://github.com/openssl/openssl/commit/898fb884b706aaeb283de4812340bb0bde8476dc
Added
Reference
https://security.FreeBSD.org/advisories/FreeBSD-SA-17:12.openssl.asc
Added
Reference
https://security.gentoo.org/glsa/201712-03
Added
Reference
https://security.netapp.com/advisory/ntap-20171208-0001/
Added
Reference
https://security.netapp.com/advisory/ntap-20180117-0002/
Added
Reference
https://security.netapp.com/advisory/ntap-20180419-0002/
Added
Reference
https://www.debian.org/security/2017/dsa-4065
Added
Reference
https://www.digitalmunition.me/2017/12/cve-2017-3737-openssl-security-bypass-vulnerability/
Added
Reference
https://www.openssl.org/news/secadv/20171207.txt
Added
Reference
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
Added
Reference
https://www.tenable.com/security/tns-2017-16
CVE Modified by OpenSSL Software Foundation 5/14/2024 12:39:09 AM
Action
Type
Old Value
New Value
CWE Remap by NIST 10/02/2019 8:03:26 PM
Action
Type
Old Value
New Value
Changed
CWE
CWE-388
CWE-125
CWE-787
CVE Modified by OpenSSL Software Foundation 7/23/2019 7:15:23 PM
Action
Type
Old Value
New Value
Added
Reference
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html [No Types Assigned]
CVE Modified by OpenSSL Software Foundation 8/08/2018 9:29:03 PM
Action
Type
Old Value
New Value
Added
Reference
https://cert-portal.siemens.com/productcert/pdf/ssa-179516.pdf [No Types Assigned]
CVE Modified by OpenSSL Software Foundation 7/18/2018 9:29:06 PM
Action
Type
Old Value
New Value
Added
Reference
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html [No Types Assigned]
CVE Modified by OpenSSL Software Foundation 7/13/2018 9:29:01 PM
Action
Type
Old Value
New Value
Added
Reference
https://access.redhat.com/errata/RHSA-2018:2185 [No Types Assigned]
Added
Reference
https://access.redhat.com/errata/RHSA-2018:2186 [No Types Assigned]
Added
Reference
https://access.redhat.com/errata/RHSA-2018:2187 [No Types Assigned]
CVE Modified by OpenSSL Software Foundation 4/20/2018 9:29:00 PM
Action
Type
Old Value
New Value
Added
Reference
https://security.netapp.com/advisory/ntap-20180419-0002/ [No Types Assigned]
CVE Modified by OpenSSL Software Foundation 4/19/2018 9:29:19 PM
Action
Type
Old Value
New Value
Added
Reference
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html [No Types Assigned]
CVE Modified by OpenSSL Software Foundation 4/11/2018 9:29:04 PM
Action
Type
Old Value
New Value
Added
Reference
https://access.redhat.com/errata/RHSA-2018:0998 [No Types Assigned]
CVE Modified by OpenSSL Software Foundation 1/23/2018 9:29:01 PM
Action
Type
Old Value
New Value
Added
Reference
https://github.com/openssl/openssl/commit/898fb884b706aaeb283de4812340bb0bde8476dc [No Types Assigned]
CVE Modified by OpenSSL Software Foundation 1/18/2018 1:18:11 PM
Action
Type
Old Value
New Value
Added
Reference
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html [No Types Assigned]
Added
Reference
https://security.netapp.com/advisory/ntap-20180117-0002/ [No Types Assigned]
CVE Modified by OpenSSL Software Foundation 1/17/2018 9:29:16 PM
Action
Type
Old Value
New Value
Added
Reference
https://www.tenable.com/security/tns-2017-16 [No Types Assigned]
Initial Analysis by NIST 12/22/2017 2:40:57 PM
Action
Type
Old Value
New Value
Added
CVSS V3
AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
Added
CVSS V2
(AV:N/AC:M/Au:N/C:P/I:N/A:N)
Added
CWE
CWE-388
Added
CPE Configuration
OR
*cpe:2.3:a:openssl:openssl:1.0.2b:*:*:*:*:*:*:*
*cpe:2.3:a:openssl:openssl:1.0.2c:*:*:*:*:*:*:*
*cpe:2.3:a:openssl:openssl:1.0.2d:*:*:*:*:*:*:*
*cpe:2.3:a:openssl:openssl:1.0.2e:*:*:*:*:*:*:*
*cpe:2.3:a:openssl:openssl:1.0.2f:*:*:*:*:*:*:*
*cpe:2.3:a:openssl:openssl:1.0.2g:*:*:*:*:*:*:*
*cpe:2.3:a:openssl:openssl:1.0.2h:*:*:*:*:*:*:*
*cpe:2.3:a:openssl:openssl:1.0.2i:*:*:*:*:*:*:*
*cpe:2.3:a:openssl:openssl:1.0.2j:*:*:*:*:*:*:*
*cpe:2.3:a:openssl:openssl:1.0.2k:*:*:*:*:*:*:*
*cpe:2.3:a:openssl:openssl:1.0.2l:*:*:*:*:*:*:*
*cpe:2.3:a:openssl:openssl:1.0.2m:*:*:*:*:*:*:*
Added
CPE Configuration
OR
*cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
Changed
Reference Type
http://www.securityfocus.com/bid/102103 No Types Assigned
http://www.securityfocus.com/bid/102103 Third Party Advisory, VDB Entry
Changed
Reference Type
http://www.securitytracker.com/id/1039978 No Types Assigned
http://www.securitytracker.com/id/1039978 Third Party Advisory, VDB Entry
Changed
Reference Type
https://security.FreeBSD.org/advisories/FreeBSD-SA-17:12.openssl.asc No Types Assigned
https://security.FreeBSD.org/advisories/FreeBSD-SA-17:12.openssl.asc Third Party Advisory
Changed
Reference Type
https://security.gentoo.org/glsa/201712-03 No Types Assigned
https://security.gentoo.org/glsa/201712-03 Third Party Advisory
Changed
Reference Type
https://security.netapp.com/advisory/ntap-20171208-0001/ No Types Assigned
https://security.netapp.com/advisory/ntap-20171208-0001/ Third Party Advisory
Changed
Reference Type
https://www.debian.org/security/2017/dsa-4065 No Types Assigned
https://www.debian.org/security/2017/dsa-4065 Third Party Advisory
Changed
Reference Type
https://www.digitalmunition.me/2017/12/cve-2017-3737-openssl-security-bypass-vulnerability/ No Types Assigned
https://www.digitalmunition.me/2017/12/cve-2017-3737-openssl-security-bypass-vulnerability/ Third Party Advisory
Changed
Reference Type
https://www.openssl.org/news/secadv/20171207.txt No Types Assigned
https://www.openssl.org/news/secadv/20171207.txt Vendor Advisory
CVE Modified by OpenSSL Software Foundation 12/18/2017 9:29:41 PM
Action
Type
Old Value
New Value
Added
Reference
https://www.debian.org/security/2017/dsa-4065 [No Types Assigned]
CVE Modified by OpenSSL Software Foundation 12/15/2017 9:29:10 PM
Action
Type
Old Value
New Value
Added
Reference
https://security.gentoo.org/glsa/201712-03 [No Types Assigned]
CVE Modified by OpenSSL Software Foundation 12/13/2017 9:29:10 PM
Action
Type
Old Value
New Value
Added
Reference
https://www.digitalmunition.me/2017/12/cve-2017-3737-openssl-security-bypass-vulnerability/ [No Types Assigned]
CVE Modified by OpenSSL Software Foundation 12/10/2017 9:29:00 PM
Action
Type
Old Value
New Value
Added
Reference
https://security.FreeBSD.org/advisories/FreeBSD-SA-17:12.openssl.asc [No Types Assigned]
CVE Modified by OpenSSL Software Foundation 12/09/2017 9:29:05 PM
Action
Type
Old Value
New Value
Added
Reference
https://security.netapp.com/advisory/ntap-20171208-0001/ [No Types Assigned]
CVE Modified by OpenSSL Software Foundation 12/08/2017 9:29:09 PM
Action
Type
Old Value
New Value
Added
Reference
http://www.securityfocus.com/bid/102103 [No Types Assigned]
Added
Reference
http://www.securitytracker.com/id/1039978 [No Types Assigned]
Quick Info
CVE Dictionary Entry: CVE-2017-3737 NVD
Published Date: 12/07/2017 NVD
Last Modified: 04/19/2025
Source: OpenSSL Software Foundation