OpenSSL.SSL_check_chain.NULL.Pointer.Dereference
Description
This indicates an attack attempt to exploit a Memory Access Error Vulnerability in OpenSSL Project OpenSSL.
This vulnerability is due to incorrect handling of the "signature_algorithms_cert" TLS extension by SSL_check_chain(). Successful exploitation will cause the service to abnormally terminate, leading to a denial-of-service condition.
Affected Products
OpenSSL Project OpenSSL 1.1.1d
OpenSSL Project OpenSSL 1.1.1e
OpenSSL Project OpenSSL 1.1.1f
Impact
Denial of Service: Remote attackers can crash vulnerable systems.
Recommended Actions
Apply the most recent upgrade or patch from the vendor.
https://www.openssl.org/news/secadv/20200421.txt
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |
Version Updates
Date | Version | Detail |
---|---|---|
2020-05-14 | 15.845 | Default_action:pass:drop |
2020-05-06 | 15.838 | |
2020-05-06 | 15.837 | |
2020-05-06 | 15.836 |