CVE-2020-1967 (CNNVD-202004-1790)

HIGH
中文标题:
Openssl OpenSSL 代码问题漏洞
英文标题:
Segmentation fault in SSL_check_chain
CVSS分数: 7.5
发布时间: 2020-04-21 13:45:15
漏洞类型: 代码问题
状态: PUBLISHED
数据质量分数: 0.30
数据版本: v3
漏洞描述
中文描述:

OpenSSL是OpenSSL团队的一个开源的能够实现安全套接层(SSLv2/v3)和安全传输层(TLSv1)协议的通用加密库。该产品支持多种加密算法,包括对称密码、哈希算法、安全散列算法等。 OpenSSL 1.1.1d版本、1.1.1e版本和1.1.1f版本中的‘SSL_check_chain()’函数存在代码问题漏洞。远程攻击者可利用该漏洞导致服务器或客户端应用程序崩溃。

英文描述:

Server or client applications that call the SSL_check_chain() function during or after a TLS 1.3 handshake may crash due to a NULL pointer dereference as a result of incorrect handling of the "signature_algorithms_cert" TLS extension. The crash occurs if an invalid or unrecognised signature algorithm is received from the peer. This could be exploited by a malicious peer in a Denial of Service attack. OpenSSL version 1.1.1d, 1.1.1e, and 1.1.1f are affected by this issue. This issue did not affect OpenSSL versions prior to 1.1.1d. Fixed in OpenSSL 1.1.1g (Affected 1.1.1d-1.1.1f).

CWE类型:
CWE-476
标签:
(暂无数据)
受影响产品
厂商 产品 版本 版本范围 平台 CPE
OpenSSL OpenSSL Fixed in OpenSSL 1.1.1g (Affected 1.1.1d-1.1.1f) - - cpe:2.3:a:openssl:openssl:fixed_in_openssl_1.1.1g_(affected_1.1.1d-1.1.1f):*:*:*:*:*:*:*
openssl openssl * - - cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*
debian debian_linux 9.0 - - cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
debian debian_linux 10.0 - - cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
freebsd freebsd 12.1 - - cpe:2.3:o:freebsd:freebsd:12.1:-:*:*:*:*:*:*
fedoraproject fedora 30 - - cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
fedoraproject fedora 31 - - cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
fedoraproject fedora 32 - - cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
oracle application_server 12.1.3 - - cpe:2.3:a:oracle:application_server:12.1.3:*:*:*:*:*:*:*
oracle enterprise_manager_base_platform 13.4.0.0 - - cpe:2.3:a:oracle:enterprise_manager_base_platform:13.4.0.0:*:*:*:*:*:*:*
oracle enterprise_manager_for_storage_management 13.3.0.0 - - cpe:2.3:a:oracle:enterprise_manager_for_storage_management:13.3.0.0:*:*:*:*:*:*:*
oracle enterprise_manager_for_storage_management 13.4.0.0 - - cpe:2.3:a:oracle:enterprise_manager_for_storage_management:13.4.0.0:*:*:*:*:*:*:*
oracle enterprise_manager_ops_center 12.4.0 - - cpe:2.3:a:oracle:enterprise_manager_ops_center:12.4.0:*:*:*:*:*:*:*
oracle http_server 12.2.1.4.0 - - cpe:2.3:a:oracle:http_server:12.2.1.4.0:*:*:*:*:*:*:*
oracle jd_edwards_world_security a9.4 - - cpe:2.3:a:oracle:jd_edwards_world_security:a9.4:*:*:*:*:*:*:*
oracle mysql * - - cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
oracle mysql_connectors * - - cpe:2.3:a:oracle:mysql_connectors:*:*:*:*:*:*:*:*
oracle mysql_enterprise_monitor * - - cpe:2.3:a:oracle:mysql_enterprise_monitor:*:*:*:*:*:*:*:*
oracle mysql_workbench * - - cpe:2.3:a:oracle:mysql_workbench:*:*:*:*:*:*:*:*
oracle peoplesoft_enterprise_peopletools 8.56 - - cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.56:*:*:*:*:*:*:*
oracle peoplesoft_enterprise_peopletools 8.57 - - cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.57:*:*:*:*:*:*:*
oracle peoplesoft_enterprise_peopletools 8.58 - - cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.58:*:*:*:*:*:*:*
oracle peoplesoft_enterprise_peopletools 8.59 - - cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.59:*:*:*:*:*:*:*
netapp active_iq_unified_manager * - - cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
netapp e-series_performance_analyzer - - - cpe:2.3:a:netapp:e-series_performance_analyzer:-:*:*:*:*:*:*:*
netapp oncommand_insight - - - cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
netapp oncommand_workflow_automation - - - cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
netapp smi-s_provider - - - cpe:2.3:a:netapp:smi-s_provider:-:*:*:*:*:*:*:*
netapp snapcenter - - - cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
netapp steelstore_cloud_integrated_storage - - - cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*
broadcom fabric_operating_system - - - cpe:2.3:o:broadcom:fabric_operating_system:-:*:*:*:*:*:*:*
opensuse leap 15.1 - - cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
opensuse leap 15.2 - - cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*
jdedwards enterpriseone * - - cpe:2.3:a:jdedwards:enterpriseone:*:*:*:*:*:*:*:*
tenable log_correlation_engine * - - cpe:2.3:a:tenable:log_correlation_engine:*:*:*:*:*:*:*:*
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
FreeBSD-SA-20:11 vendor-advisory
cve.org
访问
DSA-4661 vendor-advisory
cve.org
访问
[oss-security] 20200422 [CVE-2020-1967] OpenSSL 1.1.1d+ Segmentation fault in SSL_check_chain mailing-list
cve.org
访问
[tomcat-dev] 20200422 Time for Tomcat Native 1.2.24? mailing-list
cve.org
访问
[tomcat-dev] 20200422 Re: Time for Tomcat Native 1.2.24? mailing-list
cve.org
访问
[tomcat-dev] 20200423 Re: Time for Tomcat Native 1.2.24? mailing-list
cve.org
访问
GLSA-202004-10 vendor-advisory
cve.org
访问
FEDORA-2020-fcc91a28e8 vendor-advisory
cve.org
访问
FEDORA-2020-da2d1ef2d7 vendor-advisory
cve.org
访问
20200501 CVE-2020-1967: proving sigalg != NULL mailing-list
cve.org
访问
FEDORA-2020-d7b29838f6 vendor-advisory
cve.org
访问
openSUSE-SU-2020:0933 vendor-advisory
cve.org
访问
openSUSE-SU-2020:0945 vendor-advisory
cve.org
访问
无标题 x_refsource_MISC
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
无标题 x_refsource_MISC
cve.org
访问
无标题 x_refsource_MISC
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
无标题 x_refsource_MISC
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
无标题 x_refsource_MISC
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
无标题 x_refsource_MISC
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
无标题 x_refsource_MISC
cve.org
访问
无标题 x_refsource_MISC
cve.org
访问
CVSS评分详情
7.5
HIGH
CVSS向量: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS版本: 3.1
机密性
NONE
完整性
NONE
可用性
HIGH
时间信息
发布时间:
2020-04-21 13:45:15
修改时间:
2024-09-17 03:13:46
创建时间:
2025-11-11 15:36:09
更新时间:
2025-11-11 15:55:55
利用信息
暂无可利用代码信息
数据源详情
数据源 记录ID 版本 提取时间
CVE cve_CVE-2020-1967 2025-11-11 15:20:28 2025-11-11 07:36:09
NVD nvd_CVE-2020-1967 2025-11-11 14:56:57 2025-11-11 07:44:35
CNNVD cnnvd_CNNVD-202004-1790 2025-11-11 15:10:25 2025-11-11 07:55:55
版本与语言
当前版本: v3
主要语言: EN
支持语言:
EN ZH
安全公告
暂无安全公告信息
变更历史
v3 CNNVD
2025-11-11 15:55:55
vulnerability_type: 未提取 → 代码问题; cnnvd_id: 未提取 → CNNVD-202004-1790; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
  • vulnerability_type: 未提取 -> 代码问题
  • cnnvd_id: 未提取 -> CNNVD-202004-1790
  • data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2 NVD
2025-11-11 15:44:35
severity: SeverityLevel.MEDIUM → SeverityLevel.HIGH; cvss_score: 未提取 → 7.5; cvss_vector: NOT_EXTRACTED → CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H; cvss_version: NOT_EXTRACTED → 3.1; affected_products_count: 1 → 35; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
  • severity: SeverityLevel.MEDIUM -> SeverityLevel.HIGH
  • cvss_score: 未提取 -> 7.5
  • cvss_vector: NOT_EXTRACTED -> CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  • cvss_version: NOT_EXTRACTED -> 3.1
  • affected_products_count: 1 -> 35
  • data_sources: ['cve'] -> ['cve', 'nvd']